BibTeX records: Rinku Dewri

download as .bib file

@article{DBLP:journals/ijisec/MadabhushiD23,
  author       = {Srinidhi Madabhushi and
                  Rinku Dewri},
  title        = {A survey of anomaly detection methods for power grids},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {6},
  pages        = {1799--1832},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00720-z},
  doi          = {10.1007/S10207-023-00720-Z},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MadabhushiD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/DengBLDB23,
  author       = {Tianjie Deng and
                  Anamika Barman{-}Adhikari and
                  Young Jin Lee and
                  Rinku Dewri and
                  Kimberly Bender},
  title        = {Substance use and sentiment and topical tendencies: a study using
                  social media conversations of youth experiencing homelessness},
  journal      = {Inf. Technol. People},
  volume       = {36},
  number       = {6},
  pages        = {2515--2542},
  year         = {2023},
  url          = {https://doi.org/10.1108/ITP-12-2020-0860},
  doi          = {10.1108/ITP-12-2020-0860},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itp/DengBLDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AdhikariDD23,
  author       = {Andrick Adhikari and
                  Sanchari Das and
                  Rinku Dewri},
  title        = {Evolution of Composition, Readability, and Structure of Privacy Policies
                  over Two Decades},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {3},
  pages        = {138--153},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0074},
  doi          = {10.56553/POPETS-2023-0074},
  timestamp    = {Sat, 24 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AdhikariDD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/KishnaniNDD23,
  author       = {Urvashi Kishnani and
                  Naheem Noah and
                  Sanchari Das and
                  Rinku Dewri},
  title        = {Assessing Security, Privacy, User Interaction, and Accessibility Features
                  in Popular E-Payment Applications},
  booktitle    = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC
                  2023, Copenhagen, Denmark, October 16-17, 2023},
  pages        = {143--157},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617072.3617102},
  doi          = {10.1145/3617072.3617102},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurousec/KishnaniNDD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PandaMDD22,
  author       = {Suryakanta Panda and
                  Samrat Mondal and
                  Rinku Dewri and
                  Ashok Kumar Das},
  title        = {Towards achieving efficient access control of medical data with both
                  forward and backward secrecy},
  journal      = {Comput. Commun.},
  volume       = {189},
  pages        = {36--52},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2022.03.001},
  doi          = {10.1016/J.COMCOM.2022.03.001},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PandaMDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PatelD22,
  author       = {Shreya Patel and
                  Rinku Dewri},
  title        = {Private record linkage with linkage maps},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.265},
  doi          = {10.1002/SPY2.265},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/PatelD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MortlD22,
  author       = {Karin Mortl and
                  Rinku Dewri},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Generating-Set Evaluation of Bloom Filter Hardening Techniques in
                  Private Record Linkage},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_3},
  doi          = {10.1007/978-3-031-23690-7\_3},
  timestamp    = {Fri, 23 Dec 2022 17:47:39 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/MortlD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MadabhushiD22,
  author       = {Srinidhi Madabhushi and
                  Rinku Dewri},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_13},
  doi          = {10.1007/978-3-031-23690-7\_13},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/MadabhushiD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AdhikariDD22,
  author       = {Andrick Adhikari and
                  Sanchari Das and
                  Rinku Dewri},
  title        = {Privacy Policy Analysis with Sentence Classification},
  booktitle    = {19th Annual International Conference on Privacy, Security {\&}
                  Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PST55820.2022.9851977},
  doi          = {10.1109/PST55820.2022.9851977},
  timestamp    = {Fri, 02 Sep 2022 18:51:56 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/AdhikariDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/KishnaniNDD22,
  author       = {Urvashi Kishnani and
                  Naheem Noah and
                  Sanchari Das and
                  Rinku Dewri},
  editor       = {Yuan Hong and
                  Lingyu Wang},
  title        = {Privacy and Security Evaluation of Mobile Payment Applications Through
                  User-Generated Reviews},
  booktitle    = {Proceedings of the 21st Workshop on Privacy in the Electronic Society,
                  WPES2022, Los Angeles, CA, USA, 7 November 2022},
  pages        = {159--173},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3559613.3563196},
  doi          = {10.1145/3559613.3563196},
  timestamp    = {Thu, 03 Nov 2022 11:08:36 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/KishnaniNDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AdhikariD21,
  author       = {Andrick Adhikari and
                  Rinku Dewri},
  title        = {Towards Change Detection in Privacy Policies with Natural Language
                  Processing},
  booktitle    = {18th International Conference on Privacy, Security and Trust, {PST}
                  2021, Auckland, New Zealand, December 13-15, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PST52912.2021.9647767},
  doi          = {10.1109/PST52912.2021.9647767},
  timestamp    = {Tue, 28 Dec 2021 14:39:32 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AdhikariD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MadabhushiD21,
  author       = {Srinidhi Madabhushi and
                  Rinku Dewri},
  title        = {Detection of Demand Manipulation Attacks on a Power Grid},
  booktitle    = {18th International Conference on Privacy, Security and Trust, {PST}
                  2021, Auckland, New Zealand, December 13-15, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PST52912.2021.9647758},
  doi          = {10.1109/PST52912.2021.9647758},
  timestamp    = {Tue, 28 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MadabhushiD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BoyerCCQD18,
  author       = {Kirk Boyer and
                  Hao Chen and
                  Jingwei Chen and
                  Jian Qiu and
                  Rinku Dewri},
  editor       = {Vinod Ganapathy and
                  Trent Jaeger and
                  R. K. Shyamasundar},
  title        = {A Characterization of the Mass Surveillance Potential of Road Traffic
                  Monitors},
  booktitle    = {Information Systems Security - 14th International Conference, {ICISS}
                  2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05171-6\_1},
  doi          = {10.1007/978-3-030-05171-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BoyerCCQD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellattiBLAEDT17,
  author       = {Jacob Bellatti and
                  Andrew Brunner and
                  Joseph Lewis and
                  Prasad Annadata and
                  Wisam Eltarjaman and
                  Rinku Dewri and
                  Ramakrishna Thurimella},
  title        = {Driving Habits Data: Location Privacy Implications and Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {1},
  pages        = {12--20},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.6},
  doi          = {10.1109/MSP.2017.6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellattiBLAEDT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbdi/MitchellDTR17,
  author       = {William Mitchell and
                  Rinku Dewri and
                  Ramakrishna Thurimella and
                  Max Roschke},
  title        = {A graph traversal attack on Bloom filter-based medical data aggregation},
  journal      = {Int. J. Big Data Intell.},
  volume       = {4},
  number       = {4},
  pages        = {217--226},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJBDI.2017.10006842},
  doi          = {10.1504/IJBDI.2017.10006842},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbdi/MitchellDTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BoukhrisAAD17,
  author       = {Salah Boukhris and
                  Anneliese Andrews and
                  Ahmed Alhaddad and
                  Rinku Dewri},
  title        = {A case study of black box fail-safe testing in web applications},
  journal      = {J. Syst. Softw.},
  volume       = {131},
  pages        = {146--167},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jss.2016.09.031},
  doi          = {10.1016/J.JSS.2016.09.031},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/BoukhrisAAD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EltarjamanDT17,
  author       = {Wisam Eltarjaman and
                  Rinku Dewri and
                  Ramakrishna Thurimella},
  title        = {Location Privacy for Rank-based Geo-Query Systems},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {77--96},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0039},
  doi          = {10.1515/POPETS-2017-0039},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/EltarjamanDT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/suscom/MichananDR17,
  author       = {Junya Michanan and
                  Rinku Dewri and
                  Matthew J. Rutherford},
  title        = {GreenC5: An adaptive, energy-aware collection for green software development},
  journal      = {Sustain. Comput. Informatics Syst.},
  volume       = {13},
  pages        = {42--60},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.suscom.2016.11.004},
  doi          = {10.1016/J.SUSCOM.2016.11.004},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/suscom/MichananDR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/EltarjamanDT17,
  author       = {Wisam Eltarjaman and
                  Rinku Dewri and
                  Ramakrishna Thurimella},
  title        = {Private Retrieval of {POI} Details in Top-K Queries},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {16},
  number       = {9},
  pages        = {2611--2624},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMC.2016.2625256},
  doi          = {10.1109/TMC.2016.2625256},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/EltarjamanDT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/SalehiSMSCABRSL16,
  author       = {Mohsen Amini Salehi and
                  Jay Smith and
                  Anthony A. Maciejewski and
                  Howard Jay Siegel and
                  Edwin K. P. Chong and
                  Jonathan Apodaca and
                  Luis Diego Briceno and
                  Timothy Renner and
                  Vladimir Shestak and
                  Joshua Ladd and
                  Andrew M. Sutton and
                  David L. Janovy and
                  Sudha Govindasamy and
                  Amin Alqudah and
                  Rinku Dewri and
                  Puneet Prakash},
  title        = {Stochastic-based robust dynamic resource allocation for independent
                  tasks in a heterogeneous computing system},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {97},
  pages        = {96--111},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jpdc.2016.06.008},
  doi          = {10.1016/J.JPDC.2016.06.008},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/SalehiSMSCABRSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/DewriT16,
  author       = {Rinku Dewri and
                  Ramakrishna Thurimella},
  title        = {Mobile local search with noisy locations},
  journal      = {Pervasive Mob. Comput.},
  volume       = {32},
  pages        = {78--92},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2016.04.014},
  doi          = {10.1016/J.PMCJ.2016.04.014},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/DewriT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DewriOT16,
  author       = {Rinku Dewri and
                  Toan Ong and
                  Ramakrishna Thurimella},
  title        = {Linking Health Records for Federated Query Processing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {3},
  pages        = {4--23},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0013},
  doi          = {10.1515/POPETS-2016-0013},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DewriOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/green/MichananDR15,
  author       = {Junya Michanan and
                  Rinku Dewri and
                  Matthew J. Rutherford},
  title        = {Predicting data structures for energy efficient computing},
  booktitle    = {Sixth International Green and Sustainable Computing Conference, {IGSC}
                  2015, Las Vegas, NV, USA, December 14-16, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IGCC.2015.7393698},
  doi          = {10.1109/IGCC.2015.7393698},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/green/MichananDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/EltarjamanADT15,
  author       = {Wisam Eltarjaman and
                  Prasad Annadata and
                  Rinku Dewri and
                  Ramakrishna Thurimella},
  editor       = {Christian S. Jensen and
                  Xing Xie and
                  Vladimir Zadorozhny and
                  Sanjay Madria and
                  Evaggelia Pitoura and
                  Baihua Zheng and
                  Chi{-}Yin Chow},
  title        = {Leveraging Smartphone Advances for Continuous Location Privacy},
  booktitle    = {16th {IEEE} International Conference on Mobile Data Management, {MDM}
                  2015, Pittsburgh, PA, USA, June 15-18, 2015 - Volume 1},
  pages        = {197--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MDM.2015.36},
  doi          = {10.1109/MDM.2015.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/EltarjamanADT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ThurimellaDM15,
  author       = {Ramakrishna Thurimella and
                  Rinku Dewri and
                  William Mitchell},
  editor       = {Oleg B. Makarevich and
                  Ron Poet and
                  Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Ludmila K. Babenko and
                  Md. Sadek Ferdous and
                  Anthony T. S. Ho and
                  Vijay Laxmi and
                  Josef Pieprzyk},
  title        = {Record linkage applications in health services research: opportunities
                  and challenges},
  booktitle    = {Proceedings of the 8th International Conference on Security of Information
                  and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10,
                  2015},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2799979.2799983},
  doi          = {10.1145/2799979.2799983},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ThurimellaDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/DewriT14,
  author       = {Rinku Dewri and
                  Ramakrishna Thurimella},
  title        = {Exploiting Service Similarity for Privacy in Location-Based Search
                  Queries},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {2},
  pages        = {374--383},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.34},
  doi          = {10.1109/TPDS.2013.34},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/DewriT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/green/MichananDR14,
  author       = {Junya Michanan and
                  Rinku Dewri and
                  Matthew J. Rutherford},
  title        = {Understanding the power-performance tradeoff through Pareto analysis
                  of live performance data},
  booktitle    = {International Green Computing Conference, {IGCC} 2014, Dallas, TX,
                  USA, November 3-5, 2014},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IGCC.2014.7039164},
  doi          = {10.1109/IGCC.2014.7039164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/green/MichananDR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DewriT13,
  author       = {Rinku Dewri and
                  Ramakrishna Thurimella},
  title        = {Can a Phone's {GPS} "Lie" Intelligently?},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {91--93},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.44},
  doi          = {10.1109/MC.2013.44},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DewriT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/Dewri13,
  author       = {Rinku Dewri},
  title        = {Local Differential Perturbations: Location Privacy under Approximate
                  Knowledge Attackers},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {12},
  number       = {12},
  pages        = {2360--2372},
  year         = {2013},
  url          = {https://doi.org/10.1109/TMC.2012.208},
  doi          = {10.1109/TMC.2012.208},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/Dewri13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prisms/DewriEAT13,
  author       = {Rinku Dewri and
                  Wisam Eltarjaman and
                  Prasad Annadata and
                  Ramakrishna Thurimella},
  title        = {Beyond the thin client model for location privacy},
  booktitle    = {2013 International Conference on Privacy and Security in Mobile Systems,
                  {PRISMS} 2013, Atlantic City, NJ, USA, June 24-27, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/PRISMS.2013.6927179},
  doi          = {10.1109/PRISMS.2013.6927179},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/prisms/DewriEAT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DewriAET13,
  author       = {Rinku Dewri and
                  Prasad Annadata and
                  Wisam Eltarjaman and
                  Ramakrishna Thurimella},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Inferring trip destinations from driving habits data},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {267--272},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517871},
  doi          = {10.1145/2517840.2517871},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/DewriAET13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/DewriRRW12,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  title        = {Utility driven optimization of real time data broadcast schedules},
  journal      = {Appl. Soft Comput.},
  volume       = {12},
  number       = {7},
  pages        = {1832--1846},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.asoc.2011.04.006},
  doi          = {10.1016/J.ASOC.2011.04.006},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/DewriRRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DewriRPW12,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Nayot Poolsappasit and
                  L. Darrell Whitley},
  title        = {Optimal security hardening on attack tree models of networks: a cost-benefit
                  analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {3},
  pages        = {167--188},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0160-y},
  doi          = {10.1007/S10207-012-0160-Y},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/DewriRPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PoolsappasitDR12,
  author       = {Nayot Poolsappasit and
                  Rinku Dewri and
                  Indrajit Ray},
  title        = {Dynamic Security Risk Management Using Bayesian Attack Graphs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {61--74},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.34},
  doi          = {10.1109/TDSC.2011.34},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PoolsappasitDR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DewriRRW11,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  title        = {Exploring privacy versus data quality trade-offs in anonymization
                  techniques using multi-objective optimization},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {935--974},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0428},
  doi          = {10.3233/JCS-2011-0428},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DewriRRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/DewriRRW11,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  title        = {k-Anonymization in the Presence of Publisher Preferences},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {23},
  number       = {11},
  pages        = {1678--1690},
  year         = {2011},
  url          = {https://doi.org/10.1109/TKDE.2011.106},
  doi          = {10.1109/TKDE.2011.106},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/DewriRRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Dewri11,
  author       = {Rinku Dewri},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Location Privacy and Attacker Knowledge: Who Are We Fighting against?},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {96--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_6},
  doi          = {10.1007/978-3-642-31909-9\_6},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Dewri11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rts/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  title        = {Real time stochastic scheduling in broadcast systems with decentralized
                  data storage},
  journal      = {Real Time Syst.},
  volume       = {45},
  number       = {3},
  pages        = {143--175},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11241-010-9102-9},
  doi          = {10.1007/S11241-010-9102-9},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rts/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {On the Identification of Property Based Generalizations in Microdata
                  Anonymization},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_6},
  doi          = {10.1007/978-3-642-13739-6\_6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Takahiro Hara and
                  Christian S. Jensen and
                  Vijay Kumar and
                  Sanjay Madria and
                  Demetrios Zeinalipour{-}Yazti},
  title        = {Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based
                  Services},
  booktitle    = {Eleventh International Conference on Mobile Data Management, {MDM}
                  2010, Kanas City, Missouri, USA, 23-26 May 2010},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MDM.2010.52},
  doi          = {10.1109/MDM.2010.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DewriRRW10,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous
                  {LBS}},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_5},
  doi          = {10.1007/978-3-642-16161-2\_5},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/DewriRRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/DewriRRW09,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {David Wai{-}Lok Cheung and
                  Il{-}Yeol Song and
                  Wesley W. Chu and
                  Xiaohua Hu and
                  Jimmy Lin},
  title        = {POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy
                  lattice},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Information and Knowledge
                  Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009},
  pages        = {1037--1046},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1645953.1646085},
  doi          = {10.1145/1645953.1646085},
  timestamp    = {Fri, 27 Aug 2021 11:13:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/DewriRRW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/DewriRRW09,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {Martin L. Kersten and
                  Boris Novikov and
                  Jens Teubner and
                  Vladimir Polutin and
                  Stefan Manegold},
  title        = {On the comparison of microdata disclosure control algorithms},
  booktitle    = {{EDBT} 2009, 12th International Conference on Extending Database Technology,
                  Saint Petersburg, Russia, March 24-26, 2009, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {360},
  pages        = {240--251},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1516360.1516389},
  doi          = {10.1145/1516360.1516389},
  timestamp    = {Wed, 04 May 2022 13:02:27 +0200},
  biburl       = {https://dblp.org/rec/conf/edbt/DewriRRW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/DewriWRR09,
  author       = {Rinku Dewri and
                  L. Darrell Whitley and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Franz Rothlauf},
  title        = {A multi-objective approach to data sharing with privacy constraints
                  and preference based objectives},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1499--1506},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570102},
  doi          = {10.1145/1569901.1570102},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/DewriWRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayPD08,
  author       = {Indrajit Ray and
                  Nayot Poolsappasit and
                  Rinku Dewri},
  editor       = {Vijay Atluri},
  title        = {An Opinion Model for Evaluating Malicious Activities in Pervasive
                  Computing Systems},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_23},
  doi          = {10.1007/978-3-540-70567-3\_23},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayPD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/DewriRRW08,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Alfons Kemper and
                  Patrick Valduriez and
                  Noureddine Mouaddib and
                  Jens Teubner and
                  Mokrane Bouzeghoub and
                  Volker Markl and
                  Laurent Amsaleg and
                  Ioana Manolescu},
  title        = {Optimizing on-demand data broadcast scheduling in pervasive environments},
  booktitle    = {{EDBT} 2008, 11th International Conference on Extending Database Technology,
                  Nantes, France, March 25-29, 2008, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {261},
  pages        = {559--569},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1353343.1353411},
  doi          = {10.1145/1353343.1353411},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/DewriRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DewriRRW08,
  author       = {Rinku Dewri and
                  Indrakshi Ray and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Security Provisioning in Pervasive Environments Using Multi-objective
                  Optimization},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {349--363},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_23},
  doi          = {10.1007/978-3-540-88313-5\_23},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DewriRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/DewriWRR08,
  author       = {Rinku Dewri and
                  L. Darrell Whitley and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {Evolution strategy based optimization of on-demand dependent data
                  broadcast scheduling},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {1699--1700},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389416},
  doi          = {10.1145/1389095.1389416},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/DewriWRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/DewriRRW08,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Indrakshi Ray and
                  L. Darrell Whitley},
  editor       = {Gustavo Alonso and
                  Jos{\'{e}} A. Blakeley and
                  Arbee L. P. Chen},
  title        = {On the Optimal Selection of k in the k-Anonymity Problem},
  booktitle    = {Proceedings of the 24th International Conference on Data Engineering,
                  {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico},
  pages        = {1364--1366},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDE.2008.4497557},
  doi          = {10.1109/ICDE.2008.4497557},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/DewriRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/DewriWRR08,
  author       = {Rinku Dewri and
                  L. Darrell Whitley and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {G{\"{u}}nter Rudolph and
                  Thomas Jansen and
                  Simon M. Lucas and
                  Carlo Poloni and
                  Nicola Beume},
  title        = {Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments
                  Using Evolution Strategy},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} X, 10th International
                  Conference Dortmund, Germany, September 13-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5199},
  pages        = {991--1000},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87700-4\_98},
  doi          = {10.1007/978-3-540-87700-4\_98},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ppsn/DewriWRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DewriPRW07,
  author       = {Rinku Dewri and
                  Nayot Poolsappasit and
                  Indrajit Ray and
                  L. Darrell Whitley},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Optimal security hardening using multi-objective optimization on attack
                  tree models of networks},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {204--213},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315272},
  doi          = {10.1145/1315245.1315272},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DewriPRW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/RenganarayananHDR07,
  author       = {Lakshminarayanan Renganarayanan and
                  Manjukumar Harthikote{-}Matha and
                  Rinku Dewri and
                  Sanjay V. Rajopadhye},
  title        = {Towards Optimal Multi-level Tiling for Stencil Computations},
  booktitle    = {21th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IPDPS.2007.370291},
  doi          = {10.1109/IPDPS.2007.370291},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/RenganarayananHDR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/SmithBMSRSLSJGADP07,
  author       = {Jay Smith and
                  Luis Diego Briceno and
                  Anthony A. Maciejewski and
                  Howard Jay Siegel and
                  Timothy Renner and
                  Vladimir Shestak and
                  Joshua Ladd and
                  Andrew M. Sutton and
                  David L. Janovy and
                  Sudha Govindasamy and
                  Amin Alqudah and
                  Rinku Dewri and
                  Puneet Prakash},
  title        = {Measuring the Robustness of Resource Allocations in a Stochastic Dynamic
                  Environment},
  booktitle    = {21th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IPDPS.2007.370315},
  doi          = {10.1109/IPDPS.2007.370315},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/SmithBMSRSLSJGADP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/DebMDM04,
  author       = {Kalyanmoy Deb and
                  Kishalay Mitra and
                  Rinku Dewri and
                  Saptarshi Majumdar},
  editor       = {Kalyanmoy Deb and
                  Riccardo Poli and
                  Wolfgang Banzhaf and
                  Hans{-}Georg Beyer and
                  Edmund K. Burke and
                  Paul J. Darwen and
                  Dipankar Dasgupta and
                  Dario Floreano and
                  James A. Foster and
                  Mark Harman and
                  Owen Holland and
                  Pier Luca Lanzi and
                  Lee Spector and
                  Andrea Tettamanzi and
                  Dirk Thierens and
                  Andrew M. Tyrrell},
  title        = {Unveiling Optimal Operating Conditions for an Epoxy Polymerization
                  Process Using Multi-objective Evolutionary Computation},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary
                  Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3103},
  pages        = {920--931},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24855-2\_105},
  doi          = {10.1007/978-3-540-24855-2\_105},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/DebMDM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics