Author of the publication

Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems.

, , and . IPDPS Workshops, page 1042-1051. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bagchi, Saurabh
add a person with the name Bagchi, Saurabh
 

Other publications of authors with the same name

Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks., , , and . MASCOTS, page 31-40. IEEE Computer Society, (2012)Resource Availability Prediction in Fine-Grained Cycle Sharing Systems., , , and . HPDC, page 93-104. IEEE, (2006)Dealing with the Unknown: Resilience to Prediction Errors., , , and . PACT, page 331-342. IEEE Computer Society, (2015)Dependability as a cloud service - a modular approach., and . DSN Workshops, page 1-6. IEEE Computer Society, (2012)Integrity of Data in a Mobile Crowdsensing Campaign: A Case Study., , and . CrowdSenSys@SenSys, page 50-55. ACM, (2017)A Hypergame Analysis for ErsatzPasswords., , , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 47-61. Springer, (2018)Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage., , , and . EuroSys, page 30:1-30:16. ACM, (2016)3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009., , and . DSN, page 600-601. IEEE Computer Society, (2009)McrEngine: A scalable checkpointing system using data-aware aggregation and compression., , , , , and . Scientific Programming, 21 (3-4): 149-163 (2013)Modeling and Automated Containment of Worms., , and . IEEE Trans. Dependable Sec. Comput., 5 (2): 71-86 (2008)