Dinesh Verma
contact information
IBM Fellow, Chief Scientist - Research Consulting ProgramThomas J. Watson Research Center, Yorktown Heights, NY USA +1
914
945
4599



links
Professional Associations
Professional Associations: ACM | Fellow, IEEE | Fellow, Royal Academy of Engineeringmore information
More information: DAIS ITA Program | LinkedIn Page | NIS ITA Program | Personal Books Page2020
Using AI/ML to predict perpetrators for terrorist incidents
Dinesh C. Verma, Scott Sigmund Gartner, Diane Helen Felmlee, Dave Braines, Rithvik Yarlagadda
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II 2020
terrorism, criminology
Dinesh C. Verma, Scott Sigmund Gartner, Diane Helen Felmlee, Dave Braines, Rithvik Yarlagadda
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II 2020
terrorism, criminology
Negative ties network-based modeling of terrorist incidents
Dinesh C. Verma, Scott Sigmund Gartner, Diane Helen Felmlee, Dave Braines
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II 2020
terrorism, criminology, political science
Dinesh C. Verma, Scott Sigmund Gartner, Diane Helen Felmlee, Dave Braines
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II 2020
terrorism, criminology, political science
Distributed learning preserving model security
Verma Dinesh C, Chakraborty Supriyo, Liu Changchang
2020
Abstract encryption, homomorphic encryption, computer network, computer science, fuse, train, distributed learning, model parameters, training set
Verma Dinesh C, Chakraborty Supriyo, Liu Changchang
2020
Abstract encryption, homomorphic encryption, computer network, computer science, fuse, train, distributed learning, model parameters, training set
Polisma - A Framework for Learning Attribute-Based Access Control Policies
Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin Calo, Dinesh Verma
European Symposium on Research in Computer Security, pp. 523-544, 2020
Abstract access control, lightweight directory access protocol, computer science, information retrieval, attribute based access control, authorization
Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin Calo, Dinesh Verma
European Symposium on Research in Computer Security, pp. 523-544, 2020
Abstract access control, lightweight directory access protocol, computer science, information retrieval, attribute based access control, authorization
2019
An AI Enabled System for Distributed System Characterization
S. Calo, D. Verma, M. Touma, F. Le, D. Freimuth, E. Nahum
2019 IEEE International Conference on Cognitive Computing (ICCC), pp. 10-18
S. Calo, D. Verma, M. Touma, F. Le, D. Freimuth, E. Nahum
2019 IEEE International Conference on Cognitive Computing (ICCC), pp. 10-18
A Policy-based Approach for Measuring Data Quality
K. Grueneberg, S. Calo, P. Dewan, D. Verma, T. O’Gorman
2019 IEEE International Conference on Big Data (Big Data), pp. 4025-4031
Abstract
K. Grueneberg, S. Calo, P. Dewan, D. Verma, T. O’Gorman
2019 IEEE International Conference on Big Data (Big Data), pp. 4025-4031
Abstract
Policy-Based Identification of IoT Devices Vendor and Type by DNS Traffic Analysis
Franck Le, Jorge Ortiz, Dinesh C. Verma, Dilip D. Kandlur
PADG@ESORICS, 180-201, 2019
Abstract traffic analysis, enterprise private network, vendor, natural language, computer network, computer science, tf idf, information technology management, domain name, internet of things
Franck Le, Jorge Ortiz, Dinesh C. Verma, Dilip D. Kandlur
PADG@ESORICS, 180-201, 2019
Abstract traffic analysis, enterprise private network, vendor, natural language, computer network, computer science, tf idf, information technology management, domain name, internet of things
Federated AI for the Enterprise: A Web Services Based Implementation
Dinesh Verma, Graham White, Geeth de Mel
2019 IEEE International Conference on Web Services (ICWS), pp. 20--27
Dinesh Verma, Graham White, Geeth de Mel
2019 IEEE International Conference on Web Services (ICWS), pp. 20--27
Federated machine learning for multi-domain operations at the tactical edge
Gregory H. Cirincione, Dinesh Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications11006, 2019
Abstract software deployment, exploit, computer science, deception, machine learning, scientific method, artificial intelligence, joint force, multi domain, operational complexity, training set
Gregory H. Cirincione, Dinesh Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications11006, 2019
Abstract software deployment, exploit, computer science, deception, machine learning, scientific method, artificial intelligence, joint force, multi domain, operational complexity, training set
On the Impact of Generative Policies on Security Metrics
Dinesh Verma, Elisa Bertino, Geeth de Mel, John Melrose
2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 104--109
Dinesh Verma, Elisa Bertino, Geeth de Mel, John Melrose
2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 104--109
Generating Client Side Policies for Cyber-Physical Safety
Dinesh Verma, Seraphin Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa
2019 28th International Conference on Computer Communication and Networks (ICCCN), pp. 1--8
Dinesh Verma, Seraphin Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa
2019 28th International Conference on Computer Communication and Networks (ICCCN), pp. 1--8
Policy based Ensembles for applying ML on Big Data
D. Verma, S. Calo, E. Bertino, A. Russo, G. White
2019 IEEE International Conference on Big Data (Big Data), pp. 4038-4044
Abstract ensemble learning, ensemble forecasting, big data, machine learning, computer science, architecture, artificial intelligence, multiple models
D. Verma, S. Calo, E. Bertino, A. Russo, G. White
2019 IEEE International Conference on Big Data (Big Data), pp. 4038-4044
Abstract ensemble learning, ensemble forecasting, big data, machine learning, computer science, architecture, artificial intelligence, multiple models
Generative Policies for Coalition Systems - A Symbolic Learning Framework
Elisa Bertino, Graham White, Jorge Lobo, John Ingham, Gregory H. Cirincione, Alessandra Russo, Mark Law, Seraphin Calo, Irene Manotas, Dinesh Verma, Amani Abu Jabal, Daniel Cunnington, Geeth de Mel
2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1590-1600
symbolic learning, semantics, grammar, generative grammar, data science, context free grammar, context model, computer science, approaches of management, access control
Elisa Bertino, Graham White, Jorge Lobo, John Ingham, Gregory H. Cirincione, Alessandra Russo, Mark Law, Seraphin Calo, Irene Manotas, Dinesh Verma, Amani Abu Jabal, Daniel Cunnington, Geeth de Mel
2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1590-1600
symbolic learning, semantics, grammar, generative grammar, data science, context free grammar, context model, computer science, approaches of management, access control
Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning
Ankush Singla, Elisa Bertino, Dinesh Verma
2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 69-74
Abstract intrusion detection system, deep learning, artificial neural network, transfer of learning, machine learning, information security, computer science, scratch, artificial intelligence, labeled data, source model
Ankush Singla, Elisa Bertino, Dinesh Verma
2019 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 69-74
Abstract intrusion detection system, deep learning, artificial neural network, transfer of learning, machine learning, information security, computer science, scratch, artificial intelligence, labeled data, source model
Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures
Rih-Teng Wu, Ankush Singla, Mohammad R. Jahanshahi, Elisa Bertino, Bongjun Ko, Dinesh C. Verma
Computer-aided Civil and Infrastructure Engineering 34(9), 774-789, 2019
convolutional neural network, edge computing, artificial intelligence, pruning, computer science, condition assessment
Rih-Teng Wu, Ankush Singla, Mohammad R. Jahanshahi, Elisa Bertino, Bongjun Ko, Dinesh C. Verma
Computer-aided Civil and Infrastructure Engineering 34(9), 774-789, 2019
convolutional neural network, edge computing, artificial intelligence, pruning, computer science, condition assessment
A conceptual architecture for contractual data sharing in a decentralised environment
Iain Barclay, Alun D. Preece, Ian J. Taylor, Dinesh C. Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications11006, 2019
Abstract data quality, data sharing, audit trail, conceptual architecture, remuneration, service quality, command and control, quality of service, computer security, computer science
Iain Barclay, Alun D. Preece, Ian J. Taylor, Dinesh C. Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications11006, 2019
Abstract data quality, data sharing, audit trail, conceptual architecture, remuneration, service quality, command and control, quality of service, computer security, computer science
Agenp: An asgrammar-based generative policy framework
Seraphin Calo, Irene Manotas, Geeth de Mel, Daniel Cunnington, Mark Law, Dinesh Verma, Alessandra Russo, Elisa Bertino
Policy-Based Autonomic Data Governance, pp. 3--20, Springer, Cham, 2019
Seraphin Calo, Irene Manotas, Geeth de Mel, Daniel Cunnington, Mark Law, Dinesh Verma, Alessandra Russo, Elisa Bertino
Policy-Based Autonomic Data Governance, pp. 3--20, Springer, Cham, 2019
Towards a learning-algorithm agnostic generative policy model for coalitions
Daniel Cunnington, Mark Law, Geeth de Mel, Irene Manotas, Elisa Bertino, Seraphin Calo, Dinesh Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 110060J, 2019
Daniel Cunnington, Mark Law, Geeth de Mel, Irene Manotas, Elisa Bertino, Seraphin Calo, Dinesh Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 110060J, 2019
Value of Information: Quantification and Application to Coalition Machine Learning
Gavin Pearson, Dinesh Verma, Geeth de Mel
Policy-Based Autonomic Data Governance, pp. 21--41, Springer, 2019
Gavin Pearson, Dinesh Verma, Geeth de Mel
Policy-Based Autonomic Data Governance, pp. 21--41, Springer, 2019
Secure Model Fusion for Distributed Learning Using Partial Homomorphic Encryption
Changchang Liu, Supriyo Chakraborty, Dinesh Verma
Policy-Based Autonomic Data Governance, pp. 154--179, Springer, 2019
Changchang Liu, Supriyo Chakraborty, Dinesh Verma
Policy-Based Autonomic Data Governance, pp. 154--179, Springer, 2019
Policy-Based Identification of IoT Devices’ Vendor and Type by DNS Traffic Analysis
Franck Le, Jorge Ortiz, Dinesh Verma, Dilip Kandlur
Policy-Based Autonomic Data Governance, pp. 180--201, Springer, 2019
Franck Le, Jorge Ortiz, Dinesh Verma, Dilip Kandlur
Policy-Based Autonomic Data Governance, pp. 180--201, Springer, 2019
Self-Generating Policies for Machine Learning in Coalition Environments
Dinesh Verma, Seraphin Calo, Shonda Witherspoon, Irene Manotas, Elisa Bertino, Amani M Abu Jabal, Greg Cirincione, Ananthram Swami, Gavin Pearson, Geeth de Mel
Policy-Based Autonomic Data Governance, pp. 42--65, Springer, 2019
Dinesh Verma, Seraphin Calo, Shonda Witherspoon, Irene Manotas, Elisa Bertino, Amani M Abu Jabal, Greg Cirincione, Ananthram Swami, Gavin Pearson, Geeth de Mel
Policy-Based Autonomic Data Governance, pp. 42--65, Springer, 2019
VoI for complex AI based solutions in coalition environments
Dinesh Verma, Geeth de Mel, Gavin Pearson
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 1100609, 2019
Dinesh Verma, Geeth de Mel, Gavin Pearson
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 1100609, 2019
Managing training data from untrusted partners using self-generating policies
Dinesh Verma, Seraphin Calo, Shonda Witherspoon, Irene Manotas, Elisa Bertino, Amani Abu Jabal, Geeth de Mel, Ananthram Swami, Greg Cirincione, Gavin Pearson
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 110060P, 2019
Dinesh Verma, Seraphin Calo, Shonda Witherspoon, Irene Manotas, Elisa Bertino, Amani Abu Jabal, Geeth de Mel, Ananthram Swami, Greg Cirincione, Gavin Pearson
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 110060P, 2019
Properties of federated averaging on highly distributed data
Nirmit Desai, Dinesh Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 110061K, 2019
Nirmit Desai, Dinesh Verma
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, pp. 110061K, 2019
ProFact: A Provenance-based Analytics Framework for Access Control Policies
Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin Calo, Dinesh Verma, Christopher Williams
IEEE Transactions on Services Computing, IEEE, 2019
Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin Calo, Dinesh Verma, Christopher Williams
IEEE Transactions on Services Computing, IEEE, 2019
Towards Traceability in Data Ecosystems using a Bill of Materials Model
Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma
arXiv preprint arXiv:1904.04253, 2019
Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma
arXiv preprint arXiv:1904.04253, 2019
Blockchain Analytics and Artificial Intelligence
Donna Dillenberger, Petr Novotny, Qi Zhang, Praveen Jayachandran, Himanshu Gupta, Sameep Mehta, Sandeep Hans, Supriyo Chakraborty, Matthew Walli, John Thomas, Roman Vaculin, Kanthi Sarpatwar, Dinesh Verma
Journal of Reproduction and Development, 1-1, 2019
internal medicine, endocrinology, data science, blockchain, biology, analytics
Donna Dillenberger, Petr Novotny, Qi Zhang, Praveen Jayachandran, Himanshu Gupta, Sameep Mehta, Sandeep Hans, Supriyo Chakraborty, Matthew Walli, John Thomas, Roman Vaculin, Kanthi Sarpatwar, Dinesh Verma
Journal of Reproduction and Development, 1-1, 2019
internal medicine, endocrinology, data science, blockchain, biology, analytics
Methods and Tools for Policy Analysis
Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin Calo, Dinesh Verma, Alessandra Russo, Christopher Williams
ACM Computing Surveys 51(6), 2019
Abstract robot, policy analysis, drone, data science, data mining, correctness, computer science, change impact analysis
Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin Calo, Dinesh Verma, Alessandra Russo, Christopher Williams
ACM Computing Surveys 51(6), 2019
Abstract robot, policy analysis, drone, data science, data mining, correctness, computer science, change impact analysis
2018
Message from the Blockchain-2018 General Chairs
Vijay Varadharajan, Dinesh C. Verma, Zheng Yan
IEEE International Conference on Blockchain, 2018
computer security, computer science, blockchain
Vijay Varadharajan, Dinesh C. Verma, Zheng Yan
IEEE International Conference on Blockchain, 2018
computer security, computer science, blockchain
Blockchain-Powered Big Data Analytics Platform
Hoang Tam Vo, Mukesh K. Mohania, Dinesh Verma, Lenin Mehedy
International Conference on Big Data Analytics, pp. 15-32, 2018
Abstract transaction data, data science, data mining, data integration, cryptocurrency, computer science, blockchain, big data, analytics
Hoang Tam Vo, Mukesh K. Mohania, Dinesh Verma, Lenin Mehedy
International Conference on Big Data Analytics, pp. 15-32, 2018
Abstract transaction data, data science, data mining, data integration, cryptocurrency, computer science, blockchain, big data, analytics
The Challenge of Access Control Policies Quality
Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo, Dinesh C. Verma, Christopher Williams
Journal of Data and Information Quality 10(2), 2018
Abstract policy analysis, data sharing, data security, data mining, correctness, computer science, completeness, access control
Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo, Dinesh C. Verma, Christopher Williams
Journal of Data and Information Quality 10(2), 2018
Abstract policy analysis, data sharing, data security, data mining, correctness, computer science, completeness, access control
Security Issues for Distributed Fusion in Coalition Environments
Greg Cirincione, Dinesh C. Verma, Elisa Bertino, Ananthram Swami
2018 21st International Conference on Information Fusion (FUSION), pp. 830-837
Abstract sensor fusion, machine learning, fusion, distributed learning, distributed computing, data collection, computer science, artificial intelligence
Greg Cirincione, Dinesh C. Verma, Elisa Bertino, Ananthram Swami
2018 21st International Conference on Information Fusion (FUSION), pp. 830-837
Abstract sensor fusion, machine learning, fusion, distributed learning, distributed computing, data collection, computer science, artificial intelligence
A Policy System for Control of Data Fusion Processes and Derived Data
Elisa Bertino, Dinesh C. Verma, Seraphin B. Calo
2018 21st International Conference on Information Fusion (FUSION), pp. 807-813
Abstract sensor fusion, machine learning, information retrieval, information privacy, enforcement, encryption, derived data, data security, computer science, attribute based access control, artificial intelligence, access control
Elisa Bertino, Dinesh C. Verma, Seraphin B. Calo
2018 21st International Conference on Information Fusion (FUSION), pp. 807-813
Abstract sensor fusion, machine learning, information retrieval, information privacy, enforcement, encryption, derived data, data security, computer science, attribute based access control, artificial intelligence, access control
Generation and management of training data for AI-based algorithms targeted at coalition operations
Dinesh Verma, Greg Cirincione, Tien Pham, Bong Jun Ko
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
training set, data mining, computer science
Dinesh Verma, Greg Cirincione, Tien Pham, Bong Jun Ko
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
training set, data mining, computer science
Machine learning approaches for small data in sensor fusion applications
Dinesh Verma, Graham Bent, Geeth de Mel, Chris Simpkin
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
small data, sensor fusion, machine learning, artificial intelligence, computer science
Dinesh Verma, Graham Bent, Geeth de Mel, Chris Simpkin
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
small data, sensor fusion, machine learning, artificial intelligence, computer science
Distributed AI and security issues in federated environments
Dinesh C. Verma, Seraphin B. Calo, Greg Cirincione
Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018
Abstract attack surface, federated architecture, internet of things, security policy, vulnerability, corporate governance, distributed computing, computer science
Dinesh C. Verma, Seraphin B. Calo, Greg Cirincione
Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018
Abstract attack surface, federated architecture, internet of things, security policy, vulnerability, corporate governance, distributed computing, computer science
Implicit Terrorist Networks: A Two-Mode Social Network Analysis of Terrorism in India
Rithvik Yarlagadda, Diane Felmlee, Dinesh Verma, Scott Gartner
International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation, pp. 340-347, 2018
Abstract islamic terrorism, social network analysis, islam, terrorism, public relations, data mining, computer science
Rithvik Yarlagadda, Diane Felmlee, Dinesh Verma, Scott Gartner
International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation, pp. 340-347, 2018
Abstract islamic terrorism, social network analysis, islam, terrorism, public relations, data mining, computer science
The generative policy approach for dynamic collaboration in coalition environments
Dinesh Verma, Elisa Bertino, Seraphin Calo, Christopher Williams, Chris Simpkin
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
generative grammar, management science, computer science
Dinesh Verma, Elisa Bertino, Seraphin Calo, Christopher Williams, Chris Simpkin
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
generative grammar, management science, computer science
An algorithm for model fusion for distributed learning
Dinesh Verma, Seraphin Calo, Supriyo Chakraborty, Simon Julier, Stephen Pasteris
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
distributed learning, fusion, machine learning, artificial intelligence, computer science
Dinesh Verma, Seraphin Calo, Supriyo Chakraborty, Simon Julier, Stephen Pasteris
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, 2018
distributed learning, fusion, machine learning, artificial intelligence, computer science
Self-Generation of Access Control Policies
Seraphin Calo, Dinesh Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory Cirincione
ACM Symposium on Access Control Models and Technologies (SACMAT), 2018
Seraphin Calo, Dinesh Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory Cirincione
ACM Symposium on Access Control Models and Technologies (SACMAT), 2018
How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management)
Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino, John Ingham, Gregory H. Cirincione
2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1369-1376
Abstract intelligent decision support system, skynet, terminator, humanity, simulation, distributed computing, computer science
Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino, John Ingham, Gregory H. Cirincione
2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1369-1376
Abstract intelligent decision support system, skynet, terminator, humanity, simulation, distributed computing, computer science
2017
Measures of network centricity for edge deployment of IoT applications
Dinesh C Verma, Geeth de Mel
Big Data (Big Data), 2017 IEEE International Conference on, pp. 4612--4620
Dinesh C Verma, Geeth de Mel
Big Data (Big Data), 2017 IEEE International Conference on, pp. 4612--4620
Improving Security in Coalition Tactical Environments Using an SDN Approach
Vinod K. Mishra, Dinesh C. Verma, Christopher Williams
Guide to Security in SDN and NFV, 273-298, 2017
Abstract situation awareness, ooda loop, management science, computer security, business
Vinod K. Mishra, Dinesh C. Verma, Christopher Williams
Guide to Security in SDN and NFV, 273-298, 2017
Abstract situation awareness, ooda loop, management science, computer security, business
Edge computing architecture for applying AI to IoT
Seraphin B. Calo, Maroun Touna, Dinesh C. Verma, Alan Cullen
2017 IEEE International Conference on Big Data (Big Data), pp. 3012-3016
Abstract training set, theoretical computer science, response time, machine learning, internet of things, edge computing, data modeling, computer science, cloud computing, big data, artificial intelligence, architecture
Seraphin B. Calo, Maroun Touna, Dinesh C. Verma, Alan Cullen
2017 IEEE International Conference on Big Data (Big Data), pp. 3012-3016
Abstract training set, theoretical computer science, response time, machine learning, internet of things, edge computing, data modeling, computer science, cloud computing, big data, artificial intelligence, architecture
Policy enabled caching for distributed AI
Dinesh C. Verma, Graham Bent
2017 IEEE International Conference on Big Data (Big Data), pp. 3017-3023
Abstract the internet, machine learning, deep learning, data modeling, computer science, artificial neural network, artificial intelligence
Dinesh C. Verma, Graham Bent
2017 IEEE International Conference on Big Data (Big Data), pp. 3017-3023
Abstract the internet, machine learning, deep learning, data modeling, computer science, artificial neural network, artificial intelligence
From evolution to revolution: understanding mutability in large and disruptive human groups
Roger Marcus Whitaker, Diane Felmlee, Dinesh C. Verma, Alun David Preece, Grace-Rose Williams
Next-Generation Analyst V10207, 2017
Abstract sociology, social psychology, social network, social media, social group, rivalry, norm, in group favoritism, human evolution, disposition, computer vision, artificial intelligence
Roger Marcus Whitaker, Diane Felmlee, Dinesh C. Verma, Alun David Preece, Grace-Rose Williams
Next-Generation Analyst V10207, 2017
Abstract sociology, social psychology, social network, social media, social group, rivalry, norm, in group favoritism, human evolution, disposition, computer vision, artificial intelligence
A block chain based architecture for asset management in coalition operations
Dinesh Verma, Nirmit Desai, Alun Preece, Ian James Taylor
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR VIII10190, 2017
Abstract physics, ledger, implementation, distributed computing, digital currency, computer vision, computer security, blockchain, asset management, artificial intelligence, architecture
Dinesh Verma, Nirmit Desai, Alun Preece, Ian James Taylor
Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR VIII10190, 2017
Abstract physics, ledger, implementation, distributed computing, digital currency, computer vision, computer security, blockchain, asset management, artificial intelligence, architecture
Community-based self generation of policies and processes for assets: Concepts and research directions
Elisa Bertino, Geeth de Mel, Alessandra Russo, Seraphin Calo, Dinesh Verma
Big Data (Big Data), 2017 IEEE International Conference on, pp. 2961--2969
Elisa Bertino, Geeth de Mel, Alessandra Russo, Seraphin Calo, Dinesh Verma
Big Data (Big Data), 2017 IEEE International Conference on, pp. 2961--2969
Generative policy model for autonomic management
Dinesh C. Verma, Seraphin B. Calo, Supriyo Chakraborty, Elisa Bertino, Christopher Williams, J. Tucker, Brian Rivera
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 1-6
Abstract web server, policy based management, generative grammar, enforcement, distributed computing, computer science, access control
Dinesh C. Verma, Seraphin B. Calo, Supriyo Chakraborty, Elisa Bertino, Christopher Williams, J. Tucker, Brian Rivera
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 1-6
Abstract web server, policy based management, generative grammar, enforcement, distributed computing, computer science, access control
Provenance-Based Analytics Services for Access Control Policies
Bertino, Elisa and Jabal, Amani Abu and Calo, Seraphin and Makaya, Christian and Touma, Maroun and Verma, Dinesh and Williams, Christopher
Services (SERVICES), 2017 IEEE World Congress on, pp. 94--101
Abstract
Bertino, Elisa and Jabal, Amani Abu and Calo, Seraphin and Makaya, Christian and Touma, Maroun and Verma, Dinesh and Williams, Christopher
Services (SERVICES), 2017 IEEE World Congress on, pp. 94--101
Abstract
Intra-group Tension Under Inter-group Conflict: A Generative Model Using Group Social Norms and Identity
Verma, Dinesh and Felmlee, Diane and Pearson, Gavin
Advances in Cross-Cultural Decision Making: Proceedings of the AHFE 2017 International Conference on Cross-Cultural Decision Making, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA, pp. 167
Abstract
Verma, Dinesh and Felmlee, Diane and Pearson, Gavin
Advances in Cross-Cultural Decision Making: Proceedings of the AHFE 2017 International Conference on Cross-Cultural Decision Making, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA, pp. 167
Abstract
A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions
Bertino, Elisa and Calo, Seraphin and Toma, Maroun and Verma, Dinesh and Williams, Christopher and Rivera, Brian
Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on, pp. 1876--1886
Abstract
Bertino, Elisa and Calo, Seraphin and Toma, Maroun and Verma, Dinesh and Williams, Christopher and Rivera, Brian
Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on, pp. 1876--1886
Abstract
Invocation oriented architecture for agile code and agile data
Verma, Dinesh and Chan, Kevin and Leung, Kin and Gkelias, Athanasios
Proceedings of the SPIE, Volume 10190, id. 101900W 10 pp.(2017).190
Abstract
Verma, Dinesh and Chan, Kevin and Leung, Kin and Gkelias, Athanasios
Proceedings of the SPIE, Volume 10190, id. 101900W 10 pp.(2017).190
Abstract
Dynamic network based learning systems for sensor information fusion
Verma, Dinesh and Julier, Simon
Proceedings of the SPIE, Volume 10190, id. 101900V 8 pp.(2017).190
Abstract
Verma, Dinesh and Julier, Simon
Proceedings of the SPIE, Volume 10190, id. 101900V 8 pp.(2017).190
Abstract
A blockchain based architecture for asset management in coalition operations
Verma, Dinesh and Desai, Nirmit and Preece, Alun and Taylor, Ian
SPIE Defense+ Security, pp. 101900Y--101900Y, 2017
Abstract
Verma, Dinesh and Desai, Nirmit and Preece, Alun and Taylor, Ian
SPIE Defense+ Security, pp. 101900Y--101900Y, 2017
Abstract
Distributed Intelligence: Trends in the Management of Complex Systems
Calo, Seraphin B and Verma, Dinesh C and Bertino, Elisa
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 1--7, 2017
Abstract
Calo, Seraphin B and Verma, Dinesh C and Bertino, Elisa
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 1--7, 2017
Abstract
Audio Analysis as a Control Knob for Social Sensing
Verma, Dinesh and Ko, Bong Jun and Wang, Shiqiang and Wang, Xiping and Bent, Graham
Proceedings of the 2nd International Workshop on Social Sensing, pp. 75--80, 2017
Verma, Dinesh and Ko, Bong Jun and Wang, Shiqiang and Wang, Xiping and Bent, Graham
Proceedings of the 2nd International Workshop on Social Sensing, pp. 75--80, 2017
Using machine learning to emulate human hearing for predictive maintenance of equipment
Verma, Dinesh and Bent, Graham
Proceedings of the SPIE, Volume 10190, id. 101900K 8 pp.(2017).190
Abstract
Verma, Dinesh and Bent, Graham
Proceedings of the SPIE, Volume 10190, id. 101900K 8 pp.(2017).190
Abstract
Dynamic and adaptive policy models for coalition operations
Verma, Dinesh and Calo, Seraphin and Chakraborty, Supriyo and Bertino, Elisa and Williams, Chris and Tucker, Jeremy and Rivera, Brian and de Mel, Geeth R
Proceedings of the SPIE, Volume 10190, id. 1019006 8 pp.(2017).190
Abstract
Verma, Dinesh and Calo, Seraphin and Chakraborty, Supriyo and Bertino, Elisa and Williams, Chris and Tucker, Jeremy and Rivera, Brian and de Mel, Geeth R
Proceedings of the SPIE, Volume 10190, id. 1019006 8 pp.(2017).190
Abstract
Comparing Software Defined architectures for coalition operations
Mishra, Vinod and Verma, Dinesh and Williams, Chris and Marcus, Kelvin
Military Communications and Information Systems (ICMCIS), 2017 International Conference on, pp. 1--7
Abstract
Mishra, Vinod and Verma, Dinesh and Williams, Chris and Marcus, Kelvin
Military Communications and Information Systems (ICMCIS), 2017 International Conference on, pp. 1--7
Abstract
A generative model for predicting terrorist incidents
Verma, Dinesh C and Verma, Archit and Felmlee, Diane and Pearson, Gavin and Whitaker, Roger
Proceedings of the SPIE, Volume 10190, id. 101900E 12 pp.(2017).190
Abstract
Verma, Dinesh C and Verma, Archit and Felmlee, Diane and Pearson, Gavin and Whitaker, Roger
Proceedings of the SPIE, Volume 10190, id. 101900E 12 pp.(2017).190
Abstract
Framework for behavioral analytics in anomaly identification
Touma, Maroun and Bertino, Elisa and Calo, Seraphin and Rivera, Brian and Verma, Dinesh
SPIE DS, 2017
Abstract
Touma, Maroun and Bertino, Elisa and Calo, Seraphin and Rivera, Brian and Verma, Dinesh
SPIE DS, 2017
Abstract
2016
Acoustic Signal Processing for Anomaly Detection in Machine Room Environments: Demo Abstract
Bong Jun Ko, Jorge Ortiz, Theodoros Salonidis, Maroun Touma, Dinesh Verma, Shiqiang Wang, Xiping Wang, David Wood
Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments, pp. 213--214, ACM, 2016
Bong Jun Ko, Jorge Ortiz, Theodoros Salonidis, Maroun Touma, Dinesh Verma, Shiqiang Wang, Xiping Wang, David Wood
Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments, pp. 213--214, ACM, 2016
Demo Abstract: Acoustic Signal Processing for Anomaly Detection in Machine Room Environments
Ko, Bong Jun and Ortiz, Jorge and Salonidis, Theodoros and Touma, Maroun and Verma, Dinesh and Wang, Shiqiang and Wang, Xiping and Wood, David
ACM BuildSys, 2016
Abstract
Ko, Bong Jun and Ortiz, Jorge and Salonidis, Theodoros and Touma, Maroun and Verma, Dinesh and Wang, Shiqiang and Wang, Xiping and Wood, David
ACM BuildSys, 2016
Abstract
Leveraging SDN for Cyber Situational Awareness in Coalition Tactical Networks
Mishra, Vinod and Verma, Dinesh and Williams, Christopher
IST-148 Meeting, 2016
Abstract
Mishra, Vinod and Verma, Dinesh and Williams, Christopher
IST-148 Meeting, 2016
Abstract
2015
Advances in network sciences via collaborative multi-disciplinary research
Verma, Dinesh and Leland, Will and Pham, Tien and Swami, Ananthram and Cirincione, Greg
Information Fusion (Fusion), 2015 18th International Conference on, pp. 186--193
Abstract
Verma, Dinesh and Leland, Will and Pham, Tien and Swami, Ananthram and Cirincione, Greg
Information Fusion (Fusion), 2015 18th International Conference on, pp. 186--193
Abstract
Experiences Deploying a Transparent Split TCP Middlebox and the Implications for NFV
Franck Le, Erich Nahum, Vasilis Pappas, Maroun Touma, Dinesh Verma
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, pp. 31--36, ACM
Franck Le, Erich Nahum, Vasilis Pappas, Maroun Touma, Dinesh Verma
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, pp. 31--36, ACM
2012
An architecture for distributed video applications based on declarative networking
X. Wang, C. Gonzales, J. Lobo, S. Calo, D. Verma
Proc. of SPIE Vol, pp. 838911--1, 2012
X. Wang, C. Gonzales, J. Lobo, S. Calo, D. Verma
Proc. of SPIE Vol, pp. 838911--1, 2012
An information-centric architecture for data center networks
Bong Jun Ko, Vasileios Pappas, Ramya Raghavendra, Yang Song, Raheleh B Dilmaghani, Kang-won Lee, Dinesh Verma
Proceedings of the second edition of the ICN workshop on Information-centric networking, pp. 79--84, 2012
Bong Jun Ko, Vasileios Pappas, Ramya Raghavendra, Yang Song, Raheleh B Dilmaghani, Kang-won Lee, Dinesh Verma
Proceedings of the second edition of the ICN workshop on Information-centric networking, pp. 79--84, 2012
Distributed State Machines: A Declarative Framework for the Management of Distributed Systems
J. Lobo, D. Wood, D. Verma, S. Calo
Annual Conference of the ITA, 2012
J. Lobo, D. Wood, D. Verma, S. Calo
Annual Conference of the ITA, 2012
2011
Biologically Inspired Networking and Sensing: Algorithms and Architectures
P Lio, D Verma
2012 - igi-global.com, Medical Information Science Reference, 2011
P Lio, D Verma
2012 - igi-global.com, Medical Information Science Reference, 2011
Anomaly detection in information streams without prior domain knowledge
MS Beigi, S F Chang, S Ebadollahi, DC Verma
IBM Journal of Research and Development 55(5), 11--1, IBM, 2011
MS Beigi, S F Chang, S Ebadollahi, DC Verma
IBM Journal of Research and Development 55(5), 11--1, IBM, 2011
Self-Organizing Systems Based on Morphogenesis Principles
V Pappas, D Verma
IBM Journal of Research and Development 55(5), 12--1, IBM, 2011
V Pappas, D Verma
IBM Journal of Research and Development 55(5), 12--1, IBM, 2011
2010
Network science for military coalition operations: information exchange and interaction
D. Verma
2010 - igi-global.com, Information Science Reference
D. Verma
2010 - igi-global.com, Information Science Reference
Quality of Sensor-Originated Information in Coalition Information Networks
C Bisdikian, L M Kaplan, M B Srivastava, D J Thornley, D Verma, R I Young
Network Science for Military Coalition Operations: Information Exchange and Interaction, pp. 15, Information Science Reference, 2010
C Bisdikian, L M Kaplan, M B Srivastava, D J Thornley, D Verma, R I Young
Network Science for Military Coalition Operations: Information Exchange and Interaction, pp. 15, Information Science Reference, 2010
Morphogenesis in computer networks
V Pappas, D C Verma, P Lio
Sarnoff Symposium, 2010 IEEE, pp. 1--6
V Pappas, D C Verma, P Lio
Sarnoff Symposium, 2010 IEEE, pp. 1--6
Biologically inspired networking [Guest Editorial]
P Lio, D Verma
Network, IEEE 24(3), 4--4, IEEE, 2010
P Lio, D Verma
Network, IEEE 24(3), 4--4, IEEE, 2010
Management of coalition sensor networks
D C Verma, T Brown, C Ortega
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 4, 2010
D C Verma, T Brown, C Ortega
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 4, 2010
Dynamic composition of services in sensor networks
S C Geyik, B K Szymanski, P Zerfos, D Verma
2010 IEEE International Conference on Services Computing, pp. 242--249
S C Geyik, B K Szymanski, P Zerfos, D Verma
2010 IEEE International Conference on Services Computing, pp. 242--249
2009
Application of halftoning algorithms to location dependent sensor placement
D.C. Verma, C.W. Wu, T. Brown, A. Bar-Noy, S. Shamoun, M. Nixon
Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium on, pp. 161--164
D.C. Verma, C.W. Wu, T. Brown, A. Bar-Noy, S. Shamoun, M. Nixon
Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium on, pp. 161--164
On the mapping between logical and physical topologies
Y. Hou, M. Zafer, K. Lee, D. Verma, K.K. Leung
Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International, pp. 1--10
Y. Hou, M. Zafer, K. Lee, D. Verma, K.K. Leung
Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International, pp. 1--10
Building principles for a quality of information specification for sensor information
C. Bisdikian, L.M. Kaplan, M.B. Srivastava, D.J. Thornley, D. Verma, R.I. Young
Information Fusion, 2009. FUSION'09. 12th International Conference on, pp. 1370--1377
C. Bisdikian, L.M. Kaplan, M.B. Srivastava, D.J. Thornley, D. Verma, R.I. Young
Information Fusion, 2009. FUSION'09. 12th International Conference on, pp. 1370--1377
Principles of computer systems and network management
D C Verma
2009 - books.google.com, Springer-Verlag New York Inc
D C Verma
2009 - books.google.com, Springer-Verlag New York Inc
Operations Management
D C Verma
Principles of Computer Systems and Network Management, 63--87, Springer, 2009
D C Verma
Principles of Computer Systems and Network Management, 63--87, Springer, 2009
Guest Editors' Introduction: Special Section on Autonomic Network Computing
DR Avresky, H Prokop, D C Verma
Computers, IEEE Transactions on 58(11), 1441--1443, IEEE, 2009
DR Avresky, H Prokop, D C Verma
Computers, IEEE Transactions on 58(11), 1441--1443, IEEE, 2009
Understanding the Quality of Monitoring for Network Management
D Verma, B J Ko, P Zerfos, K Lee, T He, M Duggan, K Stewart, A Swami, N Sofra
The Computer Journal, Br Computer Soc, 2009
D Verma, B J Ko, P Zerfos, K Lee, T He, M Duggan, K Stewart, A Swami, N Sofra
The Computer Journal, Br Computer Soc, 2009
A Circulatory System Approach for Wireless Sensor Networks
V Pappas, D Verma, B J Ko, A Swami
Ad Hoc Networks 7(4), 706--724, Elsevier, 2009
V Pappas, D Verma, B J Ko, A Swami
Ad Hoc Networks 7(4), 706--724, Elsevier, 2009
More is more: the benefits of denser sensor deployment
M P Johnson, D Sarioz, A Bar-Noy, T Brown, D Verma, C W Wu
IEEE INFOCOM 2009, pp. 379--387, ACM
M P Johnson, D Sarioz, A Bar-Noy, T Brown, D Verma, C W Wu
IEEE INFOCOM 2009, pp. 379--387, ACM
Dynamic Service Execution in Sensor Networks
L Chen, Z Wang, B Szymanski, J W Branch, D Verma, R Damarla, J Ibbotson
The Computer Journal52, Br Computer Soc, 2009
L Chen, Z Wang, B Szymanski, J W Branch, D Verma, R Damarla, J Ibbotson
The Computer Journal52, Br Computer Soc, 2009
Building principles for a quality of information specification for sensor information
C Bisdikian, L M Kaplan, M B Srivastava, D J Thornley, D Verma, R I Young
Proc. of FUSION, 2009
C Bisdikian, L M Kaplan, M B Srivastava, D J Thornley, D Verma, R I Young
Proc. of FUSION, 2009
2008
Policy Enabled ITA Sensor Fabric, A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors
F. Bergamaschi, D. Conway-Jones, C. Gibson, A. Stanford-Clark, D. Verma, S. Calo, G. Cirincione, T. Pham
Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on, pp. 241--242
F. Bergamaschi, D. Conway-Jones, C. Gibson, A. Stanford-Clark, D. Verma, S. Calo, G. Cirincione, T. Pham
Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on, pp. 241--242
A Biologically Inspired Architecture for a Self Organizing Computing Network
V Pappas, D Verma, A Swami, B Rivera, Y E Lu
Proceedings of the Second Annual Conference of the International Technology Alliance, 2008
V Pappas, D Verma, A Swami, B Rivera, Y E Lu
Proceedings of the Second Annual Conference of the International Technology Alliance, 2008
The Green Zone Protection Problem
D C Verma, T Brown, L Kaplan, M Nixon
Proceedings of the Second Annual Conference of the International Technology Alliance, 2008
D C Verma, T Brown, L Kaplan, M Nixon
Proceedings of the Second Annual Conference of the International Technology Alliance, 2008
Alfresco Content Display
C Brodie, D George, C M Karat, J Karat, J Lobo, M Beigi, X Wang, S Calo, D Verma, A Schaeffer-Filho, others
2008 - computer.org
C Brodie, D George, C M Karat, J Karat, J Lobo, M Beigi, X Wang, S Calo, D Verma, A Schaeffer-Filho, others
2008 - computer.org
A Biologically-Inspired MANET Architecture
A Kershenbaum, V Pappas, K W Lee, P Lio, B Sadler, D Verma
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 4, 2008
A Kershenbaum, V Pappas, K W Lee, P Lio, B Sadler, D Verma
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 4, 2008
The Base Zone Protection Problem
L Kaplan, D C Verma, T Brown, A B Noy, A Toce, M Nixon
2008 - stormingmedia.us, IBM THOMAS J WATSON RESEARCH CENTER HAWTHORNE NY
L Kaplan, D C Verma, T Brown, A B Noy, A Toce, M Nixon
2008 - stormingmedia.us, IBM THOMAS J WATSON RESEARCH CENTER HAWTHORNE NY
Analyzing Finite MANETs by Transformations to Equivalent Static Graphs
D C Verma, B J Ko, A Swami, NY Hawthorne, MD Adelphi
IEEE Military Communications Conference, 2008, pp. 1--7
D C Verma, B J Ko, A Swami, NY Hawthorne, MD Adelphi
IEEE Military Communications Conference, 2008, pp. 1--7
On the resiliency of wireless sensor networks with circulation graphs
V Pappas, D C Verma, A Swami, B J Ko
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 5, 2008
V Pappas, D C Verma, A Swami, B J Ko
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 5, 2008
Intelligence, Surveillance, and Reconnaissance fusion for coalition operations
T Pham, G H Cirincione, D Verma, G Pearson
Information Fusion, 2008 11th International Conference on, pp. 1--8
T Pham, G H Cirincione, D Verma, G Pearson
Information Fusion, 2008 11th International Conference on, pp. 1--8
Policy Technologies for Self-Managing Systems
D Agrawal, S Calo, K Lee, J Lobo, D Verma
portal.acm.org, IBM Press, 2008
D Agrawal, S Calo, K Lee, J Lobo, D Verma
portal.acm.org, IBM Press, 2008
Location dependent heuristics for sensor coverage planning
Dinesh Chandra Verma, Chai Wah Wu, Theodore Brown, Amotz Bar-Noy, Simon Shamoun, Mark Nixon
SPIE Defense and Security Symposium, pp. 69810B--69810B, 2008
Dinesh Chandra Verma, Chai Wah Wu, Theodore Brown, Amotz Bar-Noy, Simon Shamoun, Mark Nixon
SPIE Defense and Security Symposium, pp. 69810B--69810B, 2008
Measurement and analysis of LDAP performance
X Wang, H Schulzrinne, D Kandlur, D Verma
IEEE/ACM Transactions on Networking (TON) 16(1), 232--243, IEEE Press Piscataway, NJ, USA, 2008
X Wang, H Schulzrinne, D Kandlur, D Verma
IEEE/ACM Transactions on Networking (TON) 16(1), 232--243, IEEE Press Piscataway, NJ, USA, 2008
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment
C Brodie, D George, C M Karat, J Karat, J Lobo, M Beigi, X Wang, S Calo, D Verma, A Schaeffer-Filho, others
IEEE Workshop on Policies for Distributed Systems and Networks, 2008
C Brodie, D George, C M Karat, J Karat, J Lobo, M Beigi, X Wang, S Calo, D Verma, A Schaeffer-Filho, others
IEEE Workshop on Policies for Distributed Systems and Networks, 2008
Evolution of storage management: transforming raw data into information
S Gopisetty, S Agarwala, E Butler, D Jadav, S Jaquet, M Korupolu, R Routray, P Sarkar, A Singh, M Sivan-Zimet, others
IBM Journal of Research and Development 52(4.5), 341-352, IBM, 2008
S Gopisetty, S Agarwala, E Butler, D Jadav, S Jaquet, M Korupolu, R Routray, P Sarkar, A Singh, M Sivan-Zimet, others
IBM Journal of Research and Development 52(4.5), 341-352, IBM, 2008
Holistan Revisited: Demonstrating Agent-and Knowledge-Based Capabilities for Future Coalition Military Operations
D Mott, D Braines, E Gentle, W Sieck, S Poltrock, P Houghton, A Preece, M Strub, D Roberts, D Verma
Proceedings of the Second Annual Conference of the International Technology Alliance, 2008
D Mott, D Braines, E Gentle, W Sieck, S Poltrock, P Houghton, A Preece, M Strub, D Roberts, D Verma
Proceedings of the Second Annual Conference of the International Technology Alliance, 2008
A sensor placement algorithm for redundant covering based on riesz energy minimization
C.W. Wu, D. Verma
Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on, pp. 2074--2077
C.W. Wu, D. Verma
Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on, pp. 2074--2077
Understanding the Quality of Management in Computer Networks
D Verma, B Ko, P Zerfos, K Lee, M Duggan, K Stewart, B Rivera, A Swami
Proceedings of the Second Annual Conference of the International Technology Alliance, pp. 115--122, 2008
D Verma, B Ko, P Zerfos, K Lee, M Duggan, K Stewart, B Rivera, A Swami
Proceedings of the Second Annual Conference of the International Technology Alliance, pp. 115--122, 2008
2007
Robust and Efficient Coverage in Dense Sensor Deployment
A. Bar-Noy, T. Brown, M.P. Johnson, T. La Porta, D. Sar\i\
ITA Technical Paper, 2007
A. Bar-Noy, T. Brown, M.P. Johnson, T. La Porta, D. Sar\i\
ITA Technical Paper, 2007
Simulation of sensor networks using message queue infrastructure
D C Verma, A Stanford-Clark
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 34, 2007
D C Verma, A Stanford-Clark
Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, pp. 34, 2007
On the Analysis of Finite MANETS
D Verma, B Ko, M West, A Swami
First Annual Conference of ITA, 2007
D Verma, B Ko, M West, A Swami
First Annual Conference of ITA, 2007
Holistan: A futuristic scenario for international coalition operations
D Roberts, G Lock, D C Verma
Proceedings of Knowledge Systems for Coalition Operations (KSCO 2007)
D Roberts, G Lock, D C Verma
Proceedings of Knowledge Systems for Coalition Operations (KSCO 2007)
Full coverage of a region allowing inexact placement of sensors
T Brown, D Sarioz, A B Noy, T La Porta, D Verma
First Annual Conference of the International Technology Alliance, 2007
T Brown, D Sarioz, A B Noy, T La Porta, D Verma
First Annual Conference of the International Technology Alliance, 2007
A survey of sensor selection schemes in wireless sensor networks
H Rowaihy, S Eswaran, M Johnson, D Verma, A Bar-Noy, T Brown, T La Porta
SPIE Defense and Security Symposium Conference on Unattended Ground, Sea, and Air Sensor Technologies and Applications IX, 2007
H Rowaihy, S Eswaran, M Johnson, D Verma, A Bar-Noy, T Brown, T La Porta
SPIE Defense and Security Symposium Conference on Unattended Ground, Sea, and Air Sensor Technologies and Applications IX, 2007
2006
An autonomic approach for managing security and identity management policies in enterprises
A Ganek, A Nadalin, N Nagaratnam, D Verma
Journal of High Speed Networks 15(3), 291--300, IOS Press, 2006
A Ganek, A Nadalin, N Nagaratnam, D Verma
Journal of High Speed Networks 15(3), 291--300, IOS Press, 2006
Deployment Time Performance Optimization of Internet Services
S Lee, K W Lee, K D Ryu, J D Choi, D Verma
Proc of Globecom 2006
S Lee, K W Lee, K D Ryu, J D Choi, D Verma
Proc of Globecom 2006
Geometric considerations for distribution of sensors in ad-hoc sensor networks
T Brown, D Sarioz, A Bar-Noy, T LaPorta, D Verma, M Johnson, H Rowaihy
Proc, pp. 65620U1, 2006
T Brown, D Sarioz, A Bar-Noy, T LaPorta, D Verma, M Johnson, H Rowaihy
Proc, pp. 65620U1, 2006
2005
Using peer-to-peer systems for data management
D C Verma
Peer-to-peer computing: the evolution of a disruptive technology, 66, IGI Global, 2005
D C Verma
Peer-to-peer computing: the evolution of a disruptive technology, 66, IGI Global, 2005
Policy management for networked systems and applications
D Agrawal, S Calo, J Giles, K W Lee, D Verma
Proceedings of the 9th IFIP/IEEE International Symposium on Integrated Network Management, pp. 455--468, 2005
D Agrawal, S Calo, J Giles, K W Lee, D Verma
Proceedings of the 9th IFIP/IEEE International Symposium on Integrated Network Management, pp. 455--468, 2005
2004
A Toolkit for Policy Eirablement in Autonomic Computing
SB CALO, D. VERMA
ICAC-04, International Conference on Autonomic Computing, 2004
SB CALO, D. VERMA
ICAC-04, International Conference on Autonomic Computing, 2004
Service level agreements on IP networks
D.C. Verma
Proceedings of the IEEE 92(9), 1382--1388, IEEE, 2004
D.C. Verma
Proceedings of the IEEE 92(9), 1382--1388, IEEE, 2004
Deployment Time Optimization of Distributed Applications
S Lee, KW Lee, K Ryu, JD Choi, D Verma
IBM Research Report, on-line document available at http://www. research. ibm. com/people/k/kangwon/publications/deployment\_time\_optimization. pdf, Citeseer, 2004
S Lee, KW Lee, K Ryu, JD Choi, D Verma
IBM Research Report, on-line document available at http://www. research. ibm. com/people/k/kangwon/publications/deployment\_time\_optimization. pdf, Citeseer, 2004
A toolkit for policy enablement in autonomic computing
D C Verma, S B Calo
Proceedings of the International Conference on Autonomic Computing (ICAC04), pp. 270--271, 2004
D C Verma, S B Calo
Proceedings of the International Conference on Autonomic Computing (ICAC04), pp. 270--271, 2004
Policy transformation techniques in policy-based systems management
M Beigi, S Calo, D Verma
Proc. Int'l. Wksp. Policies for Distributed Systems and Networks, Citeseer, 2004
M Beigi, S Calo, D Verma
Proc. Int'l. Wksp. Policies for Distributed Systems and Networks, Citeseer, 2004
2003
SRIRAM: A scalable resilient autonomic mesh-Author Bios
D C Verma, S Sahu, S Calo, A Shaikh, I Chang, A Acharya
IBM Systems Journal 42(1), 2003
D C Verma, S Sahu, S Calo, A Shaikh, I Chang, A Acharya
IBM Systems Journal 42(1), 2003
Approach to Policy Execution In Autonomic Manager Toolkit
H. Chan, D. Verma, A. Segal, B. Arnold, J. Giles, D. Agrawal, D. Olshefski
First Workshop on Algorithms and Architectures for Self-Managing Systems, Federated Computing Research Conference, 2003
H. Chan, D. Verma, A. Segal, B. Arnold, J. Giles, D. Agrawal, D. Olshefski
First Workshop on Algorithms and Architectures for Self-Managing Systems, Federated Computing Research Conference, 2003
SRIRAM: A scalable resilient autonomic mesh
D C Verma, S Sahu, S Calo, A Shaikh, I Chang, A Acharya
IBM Systems Journal 42(1), 19--28, Armonk, NY: International Business Machines Corp., 2003
D C Verma, S Sahu, S Calo, A Shaikh, I Chang, A Acharya
IBM Systems Journal 42(1), 19--28, Armonk, NY: International Business Machines Corp., 2003
2002
Policy based management of content distribution networks
K Amiri, S Calo, D Verma
IEEE Network Magazine, 2002
K Amiri, S Calo, D Verma
IEEE Network Magazine, 2002
Service Level Driven Provisioning of Outsourced IT Systems
SB Calo, D. Verma
IBM TJ Watson, Hawthrone, NY RC22501 6(25), 2002
SB Calo, D. Verma
IBM TJ Watson, Hawthrone, NY RC22501 6(25), 2002
An architecture for acceleration of large scale distributed web applications
S Calo, D Verma
research. ibm .com, 2002
S Calo, D Verma
research. ibm .com, 2002
On the effectiveness on content distribution networks
S Calo, D Verma, J Giles, D Agrawal
Proceeding of the 2002 International Symposium on Performance Evaluation of Computer and Telecommunication Systems
S Calo, D Verma, J Giles, D Agrawal
Proceeding of the 2002 International Symposium on Performance Evaluation of Computer and Telecommunication Systems
Authentication for Distributed Web Caches
J Giles, R Sailer, D Verma, S Chari
Lecture Notes in Computer Science2502, 126--145, Springer, 2002
J Giles, R Sailer, D Verma, S Chari
Lecture Notes in Computer Science2502, 126--145, Springer, 2002
Simplifying network administration using policy-based management
D C Verma
IEEE network 16(2), 20--26, Citeseer, 2002
D C Verma
IEEE network 16(2), 20--26, Citeseer, 2002
Policy-based management of content distribution networks
D C Verma, S Calo, K Amiri
IEEE network 16(2), 34--39, Citeseer, 2002
D C Verma, S Calo, K Amiri
IEEE network 16(2), 34--39, Citeseer, 2002
A policy service for grid computing
D Verma, S Sahu, S Calo, M Beigi, I Chang
Lecture notes in computer science, 243--255, Springer, 2002
D Verma, S Sahu, S Calo, M Beigi, I Chang
Lecture notes in computer science, 243--255, Springer, 2002
2001
Ipsecvalidate-a tool to validate ipsec configurations
R. Sailer, A. Acharya, M. Beigi, R. Jennings, D. Verma
Proceedings of LISA, 2001
R. Sailer, A. Acharya, M. Beigi, R. Jennings, D. Verma
Proceedings of LISA, 2001
Policy-Enabled Networking Architecture
D VERMA
VERMA, Dinesh. Policy-Based Networking: Architecture and Algorithms. Indian{\'a}polis: New Riders Publishing, 5--26, 2001
D VERMA
VERMA, Dinesh. Policy-Based Networking: Architecture and Algorithms. Indian{\'a}polis: New Riders Publishing, 5--26, 2001
ALMI: An application level multicast infrastructure
Dimitrios Pendarakis Tellium, Dimitrios Pendarakis, Dinesh Verma
3 rd Usenix Symposium on Internet Technologies \& Systems (USITS’01), pp. 49--60, Citeseer, 2001
Dimitrios Pendarakis Tellium, Dimitrios Pendarakis, Dinesh Verma
3 rd Usenix Symposium on Internet Technologies \& Systems (USITS’01), pp. 49--60, Citeseer, 2001
Content distribution networks: an engineering approach
D C Verma
books.google.com, Wiley-Interscience, 2001
D C Verma
books.google.com, Wiley-Interscience, 2001
Network prediction in a policy-based IP network
M Beigi, D Verma
GLOBECOM-NEW YORK-4, 2522--2526, Citeseer, 2001
M Beigi, D Verma
GLOBECOM-NEW YORK-4, 2522--2526, Citeseer, 2001
On the performance of content distribution networks
D Agrawal, J Giles, D Verma
Proceedings of SPECTS, 2001
D Agrawal, J Giles, D Verma
Proceedings of SPECTS, 2001
MPLS-based Request Routing
A S Arup Acharya, R Tewari, D Verma
Web caching and content delivery: proceedings of the sixth International Web Content Caching and Distribution Workshop, Boston University, Boston, Massachusetts, USA, June 20-22, 2001, pp. 165
A S Arup Acharya, R Tewari, D Verma
Web caching and content delivery: proceedings of the sixth International Web Content Caching and Distribution Workshop, Boston University, Boston, Massachusetts, USA, June 20-22, 2001, pp. 165
The constrained overlay network generation problem
D. Verma, H. Nguyen
International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2001
D. Verma, H. Nguyen
International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2001
Scalable web request routing with mpls
A Acharya, A Shaikh, D Verma, R Tewari
Computer Science/Mathematics, Citeseer, 2001
A Acharya, A Shaikh, D Verma, R Tewari
Computer Science/Mathematics, Citeseer, 2001
Policy based sla management in enterprise networks
D Verma, M Beigi, R Jennings
Lecture Notes in Computer Science, 137--152, Springer, 2001
D Verma, M Beigi, R Jennings
Lecture Notes in Computer Science, 137--152, Springer, 2001
2000
Third-party notification by network directory server
E J Ellesson, S D Kamat, A Krishna, R Rajan, D C Verma
US Patent 6,098,099, 2000 - Google Patents, Google Patents
US Patent 6,098,099
E J Ellesson, S D Kamat, A Krishna, R Rajan, D C Verma
US Patent 6,098,099, 2000 - Google Patents, Google Patents
US Patent 6,098,099
Active polling by network LDAP directory
E J Ellesson, S D Kamat, A Krishna, R Rajan, D C Verma
US Patent 6,101,541, 2000 - Google Patents, Google Patents
US Patent 6,101,541
E J Ellesson, S D Kamat, A Krishna, R Rajan, D C Verma
US Patent 6,101,541, 2000 - Google Patents, Google Patents
US Patent 6,101,541
Policy-Based Networking: Architecture and Algorithms
D C Verma
portal.acm.org, New Riders Publishing Thousand Oaks, CA, USA, 2000
D C Verma
portal.acm.org, New Riders Publishing Thousand Oaks, CA, USA, 2000
Policy-based differentiated services on AIX
Ashish Mehra, DC Verma, Renu Tewari, T Barzilai, D Freimuth, M Beigi
Internet Computing Magazine, 2000
Ashish Mehra, DC Verma, Renu Tewari, T Barzilai, D Freimuth, M Beigi
Internet Computing Magazine, 2000
Policy-based Diffserv on Internet servers: the AIX approach
A Mehra, D Verma, R Tewari
IEEE Internet Computing, 75--80, IEEE Computer Society, 2000
A Mehra, D Verma, R Tewari
IEEE Internet Computing, 75--80, IEEE Computer Society, 2000
1999
Low overhead continuous monitoring of IP network performance
M. Beigi, R. Jennings, D. Verma
Proceedings of Symposium on Performance Evaluation of Computer and Telecommunication Systems, 1999
M. Beigi, R. Jennings, D. Verma
Proceedings of Symposium on Performance Evaluation of Computer and Telecommunication Systems, 1999
Differentiated Services Y. Bernet, et al Internet Draft February, 1999 Document: draft-ietf-diffserv-framework-02. txt Yoram Bernet, Microsoft James Binder, 3-Com
B E Carpenter, S Keshav, B Ohlman, E D Verma
1999 - 194.146.105.14, Citeseer
B E Carpenter, S Keshav, B Ohlman, E D Verma
1999 - 194.146.105.14, Citeseer
A policy framework for integrated and differentiated services in the internet
R Rajan, D Verma, S Kamat, E Felstaine, S Herzog
IEEE network 13(5), 36--41, Citeseer, 1999
R Rajan, D Verma, S Kamat, E Felstaine, S Herzog
IEEE network 13(5), 36--41, Citeseer, 1999
1998
INTERNET-DRAFT Yoram Bernet Diffserv Working Group Microsoft Expires: November 1998 James Binder 3Com
S Blake, M Carlson, E Davies, UK Nortel, B Ohlman, D Verma, Z Wang, W Weiss
1998 - merlot.levkowetz.com
S Blake, M Carlson, E Davies, UK Nortel, B Ohlman, D Verma, Z Wang, W Weiss
1998 - merlot.levkowetz.com
Supporting service level agreements using differentiated services
M Biegi, R Jennings, S Rao, D Verma
Technical Report, 1998
M Biegi, R Jennings, S Rao, D Verma
Technical Report, 1998
1997
Interactive digital video networks: lessons from a commercial deployment
K Rath, DH Wanigasekara-Mohotli, R G Wendorf, D C Verma
Communications Magazine, IEEE 35(6), 70--74, IEEE, 1997
K Rath, DH Wanigasekara-Mohotli, R G Wendorf, D C Verma
Communications Magazine, IEEE 35(6), 70--74, IEEE, 1997
1996
The Tenet Real-Time Protocol Suite: Design
A Banerjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Implementation and Experiences," IEEE Transactions on Networking4, 1--10, 1996
A Banerjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Implementation and Experiences," IEEE Transactions on Networking4, 1--10, 1996
Decoupling qos guarantees and connection establishment in communication networks
D Verma
Proceedings of Workshop on Resource Allocation Problems in Multimedia Systems (in conjunction with RTSS), 1996
D Verma
Proceedings of Workshop on Resource Allocation Problems in Multimedia Systems (in conjunction with RTSS), 1996
The Tenet real-time protocol suite: Design, implementation, and experiences
A Banerjea, D Ferrari, B A Mah, M Moran, D C Verma, H Zhang
IEEE/ACM Transactions on Networking (TON) 4(1), 1--10, IEEE Press Piscataway, NJ, USA, 1996
A Banerjea, D Ferrari, B A Mah, M Moran, D C Verma, H Zhang
IEEE/ACM Transactions on Networking (TON) 4(1), 1--10, IEEE Press Piscataway, NJ, USA, 1996
1995
Application migration to reserved bandwidth networks
P.A. Stirpe, D.C. Verma
IS\&T/SPIE's Symposium on Electronic Imaging: Science \& Technology, pp. 428--434, 1995
P.A. Stirpe, D.C. Verma
IS\&T/SPIE's Symposium on Electronic Imaging: Science \& Technology, pp. 428--434, 1995
The NBBS access node
N Budhiraja, M Gopal, M Gupta, E A Hervatic, S J Nadas, P A Stirpe, L A Tomek, D C Verma
IBM Systems Journal 34(4), 694--704, 1995
N Budhiraja, M Gopal, M Gupta, E A Hervatic, S J Nadas, P A Stirpe, L A Tomek, D C Verma
IBM Systems Journal 34(4), 694--704, 1995
R. Gu erin. NBBS path selection framework
T Tedijanto, R Onvural, D Verma, L Gun
IBM Systems Journal 34(4), 604628, 1995
T Tedijanto, R Onvural, D Verma, L Gun
IBM Systems Journal 34(4), 604628, 1995
NBBS path selection framework
T E Tedijanto, R O Onvural, D C Verma, L Gun, RA G{'u}erin
IBM Systems Journal 34(4), 629--639, Citeseer, 1995
T E Tedijanto, R O Onvural, D C Verma, L Gun, RA G{'u}erin
IBM Systems Journal 34(4), 629--639, Citeseer, 1995
1994
On the ability of establishing real-time channels in point-to-point packet-switched networks
D Ferrari, D Verma
IEEE Trans. Communications, 1096--1105, 1994
D Ferrari, D Verma
IEEE Trans. Communications, 1096--1105, 1994
The Tenet real-time protocol suite: Design, implementation
A Banerjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Technical Report, 1994
A Banerjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Technical Report, 1994
The Tenet Real-Time Suite: Design, Implementation and Experiences; The Tenet Group
A Banerja, D Ferrari, BA Mali, M Moran, D Verma, H Zhang
University of California at Berkeley, Technical Report TR-94-059, 1994
A Banerja, D Ferrari, BA Mali, M Moran, D Verma, H Zhang
University of California at Berkeley, Technical Report TR-94-059, 1994
The Tenet real-time protocol suite: design, implementation, and experiences (TR-94-059)
A Banarjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Berkeley: International Computer Science Institute, 1994
A Banarjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Berkeley: International Computer Science Institute, 1994
1993
Routing reserved bandwith multi-point connections
D C Verma, PM Gopal
Applications, Technologies, Architectures, and Protocols for Computer Communication, 96--105, ACM New York, NY, USA, 1993
D C Verma, PM Gopal
Applications, Technologies, Architectures, and Protocols for Computer Communication, 96--105, ACM New York, NY, USA, 1993
1992
‘Delay Jitter Control for Real-Time Communications in a Packet Switching Network
H Zhang, D Ferrari, DC Verma
Computer Communications 15(6), 367--373, 1992
H Zhang, D Ferrari, DC Verma
Computer Communications 15(6), 367--373, 1992
Evaluation of overflow probabilities in resource management
D Verma, D Ferrari
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, pp. 341--341, 1992
D Verma, D Ferrari
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, pp. 341--341, 1992
Variation of traffic parameters in ATM networks
DC Verma, D Ferrari
IEEE International Conference on Communications, 1992, pp. 689--693
DC Verma, D Ferrari
IEEE International Conference on Communications, 1992, pp. 689--693
Design and implementation of the real-time internet protocol
H Zhang, D Verma, D Ferrari
Architecture and Implementation of High Performance Communication Subsystems, 1992, pp. 0\_56--0\_60
H Zhang, D Verma, D Ferrari
Architecture and Implementation of High Performance Communication Subsystems, 1992, pp. 0\_56--0\_60
1991
Delay Jitter Control for Real-Time Traffic
D Verma, H Zhang, D Ferrari
Proceedings of TriCom’91, 35--43, 1991
D Verma, H Zhang, D Ferrari
Proceedings of TriCom’91, 35--43, 1991
Delay Jitter for Real-Time Communication in a Packet Switched Network
DC Verma, H Zhang, D Ferrari
Proceedings of the TRICOM Conference, 1991
DC Verma, H Zhang, D Ferrari
Proceedings of the TRICOM Conference, 1991
Guaranteeing delay jitter bounds in packet switching networks
D Verma, H Zhang, D Ferrari
Proceedings of TRICOMM, pp. 35--46, 1991
D Verma, H Zhang, D Ferrari
Proceedings of TRICOMM, pp. 35--46, 1991
A Study of I/O Architecture for High Performance Next Generation Computers
A Sah, D C Verma, V G Oklobdjiza
High Performance Computing, II: Proceedings of the Second Symposium on High Performance Computing, Montpellier, France, 7-9 October, 1991, pp. 31
A Sah, D C Verma, V G Oklobdjiza
High Performance Computing, II: Proceedings of the Second Symposium on High Performance Computing, Montpellier, France, 7-9 October, 1991, pp. 31
{\textordfeminine}Guaranteed Performance Communication in High Speed Networks, {\textordmasculine} PhD thesis
DC Verma
Univ. of California, Berkeley, 1991
DC Verma
Univ. of California, Berkeley, 1991
Delay jitter control for real-time communication in a packet switching network
D Verma, H Zhang, D Ferrari
Proceedings of TriCom, pp. 35--43, 1991
D Verma, H Zhang, D Ferrari
Proceedings of TriCom, pp. 35--43, 1991
Guaranteed performance communication in high speed networks
D C Verma
University of California, Berkeley, Citeseer, 1991
D C Verma
University of California, Berkeley, Citeseer, 1991
1990
{\textordfeminine}A Scheme for Real-Time Channel Establishment in Wide-Area Networks, {\textordmasculine} IEEE J
D Ferrari, DC Verma
Selected Areas in Comm 8(3), 368--379, 1990
D Ferrari, DC Verma
Selected Areas in Comm 8(3), 368--379, 1990
Buffer Space Allocation for Real-Time Channels in a Packet-Switching Network
D Ferrari, D Verma
Rept. No. TR-90-022, International Computer Science Institute, Berkeley, Citeseer, 1990
D Ferrari, D Verma
Rept. No. TR-90-022, International Computer Science Institute, Berkeley, Citeseer, 1990
A scheme for real-time communication services in wide-area networks
D Ferrari, D Verma
IEEE Journal on Selected Areas in Communications 8(3), 368--379, 1990
D Ferrari, D Verma
IEEE Journal on Selected Areas in Communications 8(3), 368--379, 1990
Resource allocation and delay constraints in ATM networks
P Todorova, D Verma
Second IEEE Workshop on Future Trends of Distributed Computing Systems, Cairo, 1990
P Todorova, D Verma
Second IEEE Workshop on Future Trends of Distributed Computing Systems, Cairo, 1990
Buffer Allocation for Real-Time Channels in a Packet-Switching Network
D Ferrari, DC Verma
Technical Report, 1990
D Ferrari, DC Verma
Technical Report, 1990
A scheme for real-time channel establishment in wide-area networks
D F D Verma, D Ferrari
IEEE JSAC 8(3), 368--379, 1990
D F D Verma, D Ferrari
IEEE JSAC 8(3), 368--379, 1990
1989
Fast establishment of real-time channels
P Todorova, D Verma
preprint from UC Berkeley Tenet research group, Citeseer, 1989
P Todorova, D Verma
preprint from UC Berkeley Tenet research group, Citeseer, 1989
Year Unknown
Approach To Policy Execution in Autonomic Manager
H. Chan, D. Verma, A. Segal, B. Arnold, J. Giles, D. Agrawal, D. Olshefski
ukpmc.ac.uk, 0
H. Chan, D. Verma, A. Segal, B. Arnold, J. Giles, D. Agrawal, D. Olshefski
ukpmc.ac.uk, 0
Dynamic Composition of Services in Sensor Networks and Its Implementation under Sensor Fabric
S C Geyik, B K Szymanski, P Zerfos, D Verma, J Wright, C Gibson, C Vincent
cs.rpi.edu, 0
S C Geyik, B K Szymanski, P Zerfos, D Verma, J Wright, C Gibson, C Vincent
cs.rpi.edu, 0
Towards a Universal Utility Framework for Optimizing Sensor Network Performance
J Xie, B K Szymanski, D Wood, D C Verma, S Calo
J Xie, BK Szymanski, D Wood, DC Verma..., 0
J Xie, B K Szymanski, D Wood, D C Verma, S Calo
J Xie, BK Szymanski, D Wood, DC Verma..., 0
A Methodology for Value of Information Determination in Coalition Sensor Networks
T Brown, D Verma
domino.research.ibm.com, 0
T Brown, D Verma
domino.research.ibm.com, 0
A Circulatory System Approach for Wireless Sensor Networks а
V Pappas, D Verma, B J Ko, A Swami
usukita.org, 0
V Pappas, D Verma, B J Ko, A Swami
usukita.org, 0
System architecture of a home wireless ATM network
Y Du, S Hulyalkar, D Evans, D Petras, C Ngo, P May, C Herrmann, M Duque, R Kraemer, R Fifield, others
Universal Personal Communications, 1996, 0
Y Du, S Hulyalkar, D Evans, D Petras, C Ngo, P May, C Herrmann, M Duque, R Kraemer, R Fifield, others
Universal Personal Communications, 1996, 0
HuiZhang, and DomenicoFerrari. Guaranteeing delayjitter bounds in packet switching networks
D Verma
Proceedings of Tricomm, 0
D Verma
Proceedings of Tricomm, 0
A framework for differentiated services
Y Bernet, J Binder, S Blake, M Carlson, B E Carpenter, S Keshav, E Davies, B Ohlman, D Verma, Z Wang, others
Work in Progress, 0
Y Bernet, J Binder, S Blake, M Carlson, B E Carpenter, S Keshav, E Davies, B Ohlman, D Verma, Z Wang, others
Work in Progress, 0
The Tenet Real-Time Protocol Suite: Design, Implementation, and Experiences," International Computer Science Institute, Berkeley, CA
A Banerjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Technical Report, 0
A Banerjea, D Ferrari, B Mah, M Moran, D Verma, H Zhang
Technical Report, 0
Policy Enabled ITA Sensor Fabric A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors
D Verma, S Calo, IBM US
usukita.org, 0
D Verma, S Calo, IBM US
usukita.org, 0
Differentiated Services S. Blake, et al Internet Draft October, 1998 Document: draft-ietf-diffserv-framework-01. txt Yoram Bernet, Microsoft James Binder, 3-Com
S Keshav, E Davies, UK Nortel, B Ohlman, E D Verma, I B M Z Wang
Citeseer, Citeseer, 0
S Keshav, E Davies, UK Nortel, B Ohlman, E D Verma, I B M Z Wang
Citeseer, Citeseer, 0
Lecture notes on SLA’s and Policies
D Verma, B Winjen
IBM TJ Watson Research Center, Yorktown Heights, NY10598
D Verma, B Winjen
IBM TJ Watson Research Center, Yorktown Heights, NY10598
A Futuristic Coalition Scenario for International Coalition Operations
DC Verma, D Roberts, G H Lock
Technical Report, 0
DC Verma, D Roberts, G H Lock
Technical Report, 0
Design Documents for RTIP/RMTP, unpublished
D Verma, H Zhang
University of California at Berkeley and International Computer Science Institute, Berkeley, CA (May 1991), 0
D Verma, H Zhang
University of California at Berkeley and International Computer Science Institute, Berkeley, CA (May 1991), 0
IBM and Watson, TJ (2004)'Policy transformation techniques in policy-based systems management'
M Beigi, S Calo, D Verma
IEEE Policy, pp. 13--22, 0
M Beigi, S Calo, D Verma
IEEE Policy, pp. 13--22, 0
University of California at Berkeley
D C Verma, H Zhang, D Ferrari
Delay Jitter Control for Real-Time Communication in a Packet Switching Network 1991, 0
D C Verma, H Zhang, D Ferrari
Delay Jitter Control for Real-Time Communication in a Packet Switching Network 1991, 0