Author of the publication

Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors.

, , and . Comput. J., 56 (6): 674-692 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jhumka, Arshad
add a person with the name Jhumka, Arshad
 

Other publications of authors with the same name

Fake source-based source location privacy in wireless sensor networks., , and . Concurrency and Computation: Practice and Experience, 27 (12): 2999-3020 (2015)Automated design of efficient fail-safe fault tolerance.. Darmstadt University of Technology, (2004)CRUDE: Combining Resource Usage Data and Error Logs for Accurate Error Detection in Large-Scale Distributed Systems., , , , and . SRDS, page 51-60. IEEE Computer Society, (2016)Automated design of efficient fail-safe fault tolerance.. Darmstadt University of Technology, Germany, (2003)Global Predicate Detection in Distributed Systems with Small Faults., and . SSS, volume 4838 of Lecture Notes in Computer Science, page 296-310. Springer, (2007)Phantom walkabouts in wireless sensor networks., , and . SAC, page 609-616. ACM, (2017)Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks., , and . ICDCS, page 2200-2205. IEEE Computer Society, (2017)Using Message Logs and Resource Use Data for Cluster Failure Diagnosis., , , , , and . HiPC, page 232-241. IEEE Computer Society, (2016)Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks., , , and . PRDC, page 99-108. IEEE Computer Society, (2015)On Enhancing the Robustness of Commercial Operating Systems., , , and . ISAS, volume 3335 of Lecture Notes in Computer Science, page 148-159. Springer, (2004)