Journal Publications

 

3. ReCrew: A Reliable Flash-Dissemination System (Accepted for publication in IEEE Transactions on Computers, 2012)

Kyungbaek Kim, Mayur Deshpande, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian. NEW!

 

2. Secure Multidimensional Range Queries over Outsourced Data (accepted for publication in VLDBJ, 2011)

Bijit Hore, Mustafa Canim, Sharad Mehrotra, Murat Kantarcioglu.

 

1. CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats (accepted for publication in IEEE TPDS, 2011)

Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian.

 

Conference Publications

 

16. CloudProtect: Managing Data Privacy in Cloud Applications (accepted for publication in IEEE CLOUD, 2012)

Mamadou H. Diallo, Bijit Hore, Ee-Chien Chang, Sharad Mehrotra, Nalini Venkatasubramanian. NEW!

 

15. Risk-Aware Workload Distribution in Hybrid Clouds (accepted for publication in IEEE CLOUD, 2012)

Kerim Yasin Oktay, Vaibhav Khadilkar, Bijit Hore, Murat Kantarcioglu, Sharad Mehrotra, Bhavani Thurasingham. NEW!

 

14. Building Disclosure Risk Aware Query Optimizers for Relational Databases (VLDB 2010, Singapore) [PDF]

Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sharad Mehrotra.

 

13. Middleware for Pervasive Spaces: Balancing Privacy and Utility (MIDDLEWARE 2009, Urbana Champaign, USA) [PDF]

Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, Sharad Mehrotra, Nalini Venkatasubramanian.

 

12. CCD: Efficient Customized Content Dissemination in Distributed Publish/Subscribe (MIDDLEWARE 2009, Urbana Champaign, USA) [PDF]

Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian.

 

11. Privacy-Preserving Event Detection for Pervasive Spaces (PERCOM 2009, Galveston, USA) [PDF] [long version]

Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra, Nalini Venkatasubramanian, Daniel Massaguer.

 

10. Subscription Subsumption Evaluation for Content-based Publish/Subscribe Systems (MIDDLEWARE 2008, Leuven, Belgium) [PDF][ppt]

Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian.

 

9. Discovering GIS Sources on the Web using Summaries, (JCDL 2008, Pittsburg, USA) [PDF]

Ramaswamy Hariharan, Bijit Hore, Sharad Mehrotra.

 

8. Exploiting Semantics for Sensor Re-Calibration in Event Detection Systems, (MMCN 2008, San Jose, USA) [PDF]

Ronen Vaisenberg, Shengyue Ji, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian.

 

7. Flexible Anonymization for Privacy Preserving Data Publishing: A Systematic Search based Approach, (Siam Data Mining Conference 2007, Minneapolis, USA) [PDF] [long version]

Bijit Hore, Ravi Jammalamadaka, Sharad Mehrotra.

6. Processing Spatial-Keyword (SK) Queries in Geographical Information Retrieval (GIR) Systems, (SSDBM 2007, Banff, Canada) [PDF]
Ramaswamy Hariharan, Bijit Hore, Chen Li, Sharad Mehrotra.

5. Design and Implementation of a Middleware for Sentient Spaces, (ISI 2007, New Brunswick, USA) [PDF]
Bijit Hore, Hojjat Jafarpor, Ramesh Jain, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann.

4. CREW: A Gossip-based Flash-Dissemination System, (ICDCS 2006, Lisboa, Portugal) [PDF]
Mayur Deshpande, Bo Xing, Iosif Lazaridis, Bijit Hore, Nalini Venkatasubramanian, Sharad Mehrotra.

3. Indexing Text Data under Space Constraints, (CIKM 2004, Washington D. C., USA) [PDF] [PPT]
Bijit Hore, Hakan Hacigumus, Bala Iyer, Sharad Mehrotra.

2. A Privacy-Preserving Index for Range Queries, (VLDB 2004, Toronto, Canada) [PDF] [PPT] [long version]
Bijit Hore, Sharad Mehrotra, Gene Tsudik.

1. A Graph Partitioning System for Natural Unbalanced Partitions, (WSEAS International Conference on Information and Automation 2002, Tenerife, Spain) [PDF]
Sachin Patkar, Viraj Kumar, Bijit Hore, Hardeep Kaur.

Workshop Publications

 

1. IndexingEncrypted Documents for Supporting Efficient Keyword Search (Secure Data Management Workshop, VLDB 2012)

Bijit Hore, Mamadou H. Diallo, Ee-Chien Chang, Sharad Mehrotra. NEW!

Book Chapters & Invited articles

5. Search over Encrypted Data
(In Encyclopedia of Cryptography and Security, Springer 2011)
Ali Bagherzandi, Bijit Hore, Sharad Mehrotra.

4. Privacy of Outsourced Data
(In Encyclopedia of Cryptography and Security, Springer 2011)
Hakan Hacigumus, Bijit Hore, Sharad Mehrotra.

3. Managing and Querying Encrypted Data
(In Database Security: Applications and Trends, Ed. Michael Gertz and Sushil Jajodia, Springer 2007)
Bijit Hore, Sharad Mehrotra, Hakan Hacigumus.

2. SATware: Middleware for Sentient Spaces
(In Multimodal Surveillance: Sensors, Algorithms and Systems, Ed. Zhigang Zhu and Thomas S. Huang, 2007)
Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann

1. Search over Encrypted Data
(In Security in Decentralized Data Management, Ed. Ting Yu and Sushil Jajodia, Springer 2007)
Hakan Hacigumus, Bijit Hore, Bala Iyer, Sharad Mehrotra.

Others

2. Hollyshare: A P2P file-sharing system (ICS-Project-Report 2001, UCI) [PDF] [Download]
Ilya Issenin, Bijit Hore, Sean McCarthy, Shannon Tauro, Songmei Han.  

1. Computing Minimum Steiner Forests in Circle Graphs (Unpublished Manuscript, 2000)
Sriram V. Pemmaraju and Bijit Hore.