default search action
Leszek Lilien
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j12]Tong Wang, Leszek Lilien:
Opportunistic topology control for ad hoc wireless network survivability enhancement based on LIMOS model. J. Netw. Comput. Appl. 134: 1-12 (2019) - [e1]Torsten Braun, Leszek Lilien, Zhongliang Zhao:
15th IEEE/IFIP Wireless On-demand Network systems and Services Conference , WONS 2019, Wengen, Switzerland, January 22-24, 2019. IEEE / IFIP 2019, ISBN 978-3-903176-13-3 [contents] - [i1]Akram Y. Sarhan, Leszek Lilien:
An Approach to Identity Management in Clouds without Trusted Third Parties. CoRR abs/1904.00880 (2019) - 2018
- [c33]Wesam Fadheel, Raed M. Salih, Leszek Lilien:
PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles. TrustCom/BigDataSE 2018: 1187-1195 - [p1]Ahmed Al-Gburi, Abduljaleel Al-Hasnawi, Leszek Lilien:
Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls. Computer and Network Security Essentials 2018: 153-172 - 2017
- [c32]Abduljaleel Al-Hasnawi, Leszek Lilien:
Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module. UCC (Companion") 2017: 145-150 - 2015
- [c31]Mai A. Alduailij, Leszek T. Lilien:
A collaborative healthcare application based on opportunistic resource utilization networks with OVM primitives. CTS 2015: 426-433 - [c30]Raed M. Salih, Leszek T. Lilien:
Protecting users' privacy in healthcare cloud computing with APB-TTP. PerCom Workshops 2015: 236-238 - [c29]Chenyang Qu, Denis A. Ulybyshev, Bharat K. Bhargava, Rohit Ranchal, Leszek T. Lilien:
Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems. SRDS Workshop 2015: 47-51 - [c28]Leszek T. Lilien, Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava, Raed M. Salih, Andrew DeCarlo:
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks. SRDS Workshop 2015: 57-61 - 2014
- [j11]Leszek Lilien, Lotfi Ben Othmane, Pelin Angin, Andrew DeCarlo, Raed M. Salih, Bharat K. Bhargava:
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks. J. Netw. Comput. Appl. 38: 3-15 (2014) - [c27]Bilal Abu Bakr, Leszek T. Lilien:
Comparison by Simulation of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM. FNC/MobiSPC 2014: 180-187 - [c26]Bilal Abu Bakr, Leszek T. Lilien:
Extending Lifetime of Wireless Sensor Networks by Management of Spare Nodes. FNC/MobiSPC 2014: 493-498 - 2011
- [c25]Bilal Abu Bakr, Leszek Lilien:
A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM. ICDCS Workshops 2011: 182-191 - [c24]Bilal Abu Bakr, Leszek Lilien:
Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection. IMIS 2011: 277-282 - [c23]Bilal Abu Bakr, Leszek Lilien:
LEACH-SM: A protocol for extending wireless sensor network lifetime by management of spare nodes. WiOpt 2011: 375 - 2010
- [j10]Leszek Lilien, Ajay Gupta, Zill-E-Huma Kamal, Zijiang Yang:
Opportunistic resource utilization networks - A new paradigm for specialized ad hoc networks. Comput. Electr. Eng. 36(2): 328-340 (2010) - [c22]Leszek Lilien, Adawia Al-Alawneh, Lotfi Ben Othmane:
The pervasive trust foundation for security in next generation networks. NSPW 2010: 129-142 - [c21]Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien:
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing. SRDS 2010: 177-183 - [c20]Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong H. Kang, Mark Linderman:
Protection of Identity Information in Cloud Computing without Trusted Third Party. SRDS 2010: 368-372
2000 – 2009
- 2009
- [j9]Bharat K. Bhargava, Yu Zhang, Nwokedi C. Idika, Leszek Lilien, Mehdi Azarmi:
Collaborative attacks in WiMAX networks. Secur. Commun. Networks 2(5): 373-391 (2009) - [c19]Bharat K. Bhargava, Leszek Lilien, Torsten Braun:
Panel: Benefits and Pitfalls of Specialized Ad Hoc Networks and Systems (SAHNS). ICDCS Workshops 2009: 459 - 2008
- [j8]Zill-E-Huma Kamal, Ajay Gupta, Ashfaq A. Khokhar, Leszek Lilien:
Power Consumption Analysis of Maximum A Posterior Classifier Using LU Decomposition and Jacobi Iterations. IEEE Trans. Parallel Distributed Syst. 19(11): 1473-1483 (2008) - 2007
- [c18]Zille Huma Kamal, Ajay Gupta, Leszek Lilien, Zijiang Yang:
The MicroOppnet tool for Collaborative Computing experiments with class 2 opportunistic networks. CollaborateCom 2007: 150-159 - [c17]Leszek Lilien, Ajay Gupta, Zijiang Yang:
Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework. IPCCC 2007: 588-593 - [c16]Leszek Lilien:
A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications. MobiQuitous 2007: 1-8 - 2006
- [j7]Leszek Lilien, Bharat K. Bhargava:
A scheme for privacy-preserving data dissemination. IEEE Trans. Syst. Man Cybern. Part A 36(3): 503-506 (2006) - [c15]Leszek Lilien, Zille Huma Kamal, Ajay Gupta:
Opportunistic Networks: Challenges in Specializing the P2P Paradigm. DEXA Workshops 2006: 722-726 - [c14]Zille Huma Kamal, Ajay Gupta, Leszek Lilien, Ashfaq A. Khokhar:
An Efficient MAP Classifier for Sensornets. HiPC 2006: 560-571 - [c13]Zille Huma Kamal, Ajay Gupta, Leszek Lilien, Ashfaq A. Khokhar:
Classification using Efficient LU Decomposition in Sensornets. Wireless and Optical Communications 2006 - 2004
- [j6]Steffen Staab, Bharat K. Bhargava, Leszek Lilien, Arnon Rosenthal, Marianne Winslett, Morris Sloman, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain, Wolfgang Nejdl, Daniel Olmedilla, Vipul Kashyap:
The Pudding of Trust. IEEE Intell. Syst. 19(5): 74-88 (2004) - [c12]Bharat K. Bhargava, Leszek Lilien:
Vulnerabilities and Threats in Distributed Systems. ICDCIT 2004: 146-157 - [c11]Mamata Jenamani, Leszek Lilien, Bharat K. Bhargava:
Anonymizing Web Services through a Club Mechanism with Economic Incentives. ICWS 2004: 792-795 - 2003
- [c10]IlYoung Chung, Bharat K. Bhargava, Malika Mahoui, Leszek Lilien:
Autonomous Transaction Processing Using Data Dependency in Mobile Environments. FTDCS 2003: 138-144
1990 – 1999
- 1991
- [j5]Wojtek Kozaczynski, Leszek Lilien, Clement T. Yu:
An adaptive mixed relation decomposition algorithm for conjunctive retrieval queries. Inf. Sci. 53(1-2): 35-60 (1991)
1980 – 1989
- 1989
- [j4]Leszek Lilien, Thai M. Chung:
Pessimistic quasipartitioning protocols for distributed database systems. IEEE J. Sel. Areas Commun. 7(3): 341-353 (1989) - [c9]Leszek Lilien:
Quasi-Partitioning: A New Paradigm for Transaction Execution in Partitioned Distributed Database Systems. ICDE 1989: 546-553 - 1988
- [c8]Cyril U. Orji, Leszek Lilien, Janusz Hyziak:
A Performance Analysis of an Optimistic and a Basic Timestamp-Ordering Concurrency Control Algorithm for Centralized Database Systems. ICDE 1988: 64-71 - [c7]Leszek Lilien, Thai M. Chung:
Pessimistic Protocols for Quasi-Partitioned Distributed Database Systems. SRDS 1988: 35-43 - 1987
- [c6]Sushil V. Pillai, Ramanatham Gudipati, Leszek Lilien:
Design issues and an architecture for a heterogenous multidatabase system. ACM Conference on Computer Science 1987: 74-79 - [c5]Wojtek Kozaczynski, Leszek Lilien:
An Extended Entity-Relationship (E²R) Database Specification and its Automatic Verification and Transformation into the Logical Relational Design. ER 1987: 533-549 - [c4]Jinghao Xu, Leszek Lilien:
A survey of methods for system-level fault diagnosis. FJCC 1987: 534-540 - 1986
- [c3]Clement T. Yu, Leszek Lilien, Keh-Chang Guh, Marjorie Templeton, David Brill, Arbee L. P. Chen:
Adaptive Techniques for Distributed Query Optimization. ICDE 1986: 86-93 - 1985
- [j3]Leszek Lilien, Bharat K. Bhargava:
Database Integrity Block Construct: Concepts and Design Issues. IEEE Trans. Software Eng. 11(9): 865-885 (1985) - 1984
- [j2]Leszek Lilien, Bharat K. Bhargava:
A Scheme for Batch Verification of Integrity Assertions in a Database System. IEEE Trans. Software Eng. 10(6): 664-680 (1984) - 1983
- [c2]Bharat K. Bhargava, Leszek Lilien:
Cost Analysis of Selected Database Restoration Techniques. ER 1983: 783-805 - 1981
- [j1]Bharat K. Bhargava, Leszek Lilien:
On optimal scheduling of integrity assertions in a transaction processing system. Int. J. Parallel Program. 10(5): 315-330 (1981) - [c1]Bharat K. Bhargava, Leszek Lilien:
Feature analysis of selected database recovery techniques. AFIPS National Computer Conference 1981: 543-554
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint