RESEARCH MONOGRAPH

1.     Building Dependable Distributed Systems, Wenbing Zhao, Scrivener Publishing, March 2014.

JOURNAL PUBLICATIONS

2.     Fast Paxos Made Easy: Theory and Implementation,
Wenbing Zhao.
International Journal of Distributed Systems and Technologies, accepted for publication, 2014.

3.     A Novel Approach to Building Intrusion Tolerant Systems,
Wenbing Zhao.
International Journal of Performability Engineering, 10(2), 123-132, 2014.

4.     Toward Trustworthy Coordination for Web Services Business Activities,
H. Chai, H. Zhang, Wenbing Zhao, P. M. Melliar-Smith, and L. E. Moser.
IEEE Transactions on Services Computing. Vol.6, No.2, 2013, pp.276--288.

5.     Low Latency Fault Tolerance System,
Wenbing Zhao, P. M. Melliar-Smith, and L. E. Moser.
The Computer Journal Vol.56, No.6, 2013, pp.716--740.

6.     Byzantine Fault Tolerance for Session-Oriented Multi-Tiered Applications,
H. Chai and W. Zhao.
International Journal of Web Services, vol.2, no.1/2, pp.113-125, 2013.

7.     Trustworthy Coordination for Web Services Atomic Transactions,
H. Zhang, H. Chai,  Wenbing Zhao, P. M. Melliar-Smith, and L. E. Moser.
IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 8, 2012, pp. 1551-1565.

8.     Concurrent Byzantine Fault Tolerance for Software-Transactional-Memory Based Applications,
H. Zhang and Wenbing Zhao.
International Journal of Future Computer and Communication, Vol. 1, No. 1, June 2012, pp. 47-50.

9.     Design and Implementation of a Byzantine Fault Tolerance Framework for Non-Deterministic Applications,
H. Zhang, Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith.

IET Software, vol. 5, no. 3, 2011, pp. 342-356.

10.   Recovering Lagging Replicas in a Fault Tolerant System,
H. Chai and Wenbing Zhao,
International Journal of Performability Engineering, Short Communications, vol. 7, no. 2, March 2011, pp. 195-197.

11.   Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems,
Wenbing Zhao and H. Zhang, IET Software, vol. 3, no. 2, April 2009, pp. 154-164.

12.   Design and Implementation of a Byzantine Fault Tolerance Framework for Web Services,
Wenbing Zhao, Journal of Systems & Software, vol. 82, no. 6, June 2009, pp. 1004-1015.

13.   A Lightweight Fault Tolerance Framework for Web Services,
Wenbing Zhao, H. Zhang, and H. Chai,
Web Intelligence and Agent Systems: An International Journal, vol. 7, no. 3, 2009, pp.255-268.

14.   Building Highly Dependable Wireless Web Services,
Wenbing Zhao,
Journal of Electronic Commerce in Organizations, vol.8, no.4, October-December 2010, pp.1-16.

15.   A Reservation-based Extended Transaction Protocol
Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith,
IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 2, February 2008, pp. 188-203.

16.   Building Dependable and Secure Web Services,
L. E. Moser, P. M. Melliar-Smith, and Wenbing Zhao
Journal of Software, Academy Publisher, vol. 2, no. 1, February 2007, pp. 14-26.

17.   A Game Theoretical View of Byzantine Fault Tolerance Design,
Wenbing Zhao
International Journal of Performability Engineering, Short Communications, vol. 3, no. 4, October 2007, pp. 498-500.

18.   Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA,
Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith,
IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 1, 2005, pp. 20-33.

19.   A Reservation-based Extended Transaction Protocol for Coordination of Web Services,
Wenbing Zhao, F. Kart, L. E. Moser and P. M. Melliar-Smith,
International Journal of Web Services Research, vol. 5, no. 3, 2008, pp. 64-95.

20.   End-to-End Latency of a Fault-Tolerant CORBA Infrastructure,
Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith,
Performance Evaluation Journal, vol.63, no 4-5, 2006, pp. 341-363.

21.   Design and Implementation of a Consistent Time Service for Fault-Tolerant Distributed Systems,
Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith,
International Journal of Computer Systems Science and Engineering, vol. 19 no. 5, 2004, pp. 315-323.

22.   Design and Implementation of a Pluggable Fault Tolerant CORBA Infrastructure,
Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith,
Cluster Computing: The Journal of Networks, Software Tools and Applications, Special issue on Dependable Distributed Systems, vol. 7, no. 4, 2004, pp. 317-330.

23.   B. X. S. Alexander, Richard Rarick, Wenbing Zhao, Lili Dong, “Simulation and Analysis of an Extended State Observer for Levitation Control of a Rotor-Bearing System,” International Journal of Engineering and Simulation, vol. 9, no.1, 2009.

 

CONFERENCE/WORKSHOP PUBLICATIONS

1.     W. Zhao, D. Espy, M. A. Reinthal, and H. Feng, A Feasibility Study of Using a Single Kinect Sensor for Rehabilitation Exercises Monitoring: A Rule Based Approach, in Proceedings of the IEEE Symposium on Computational Intelligence in Healthcare and e-Health, Orlando, Florida, USA, December 9-12, 2014. (accepted)

2.     W. Zhao, R. Lun, D. Espy, and M. A. Reinthal, Rule Based Realtime Motion Assessment for Rehabilitation Exercises, in Proceedings of the IEEE Symposium on Computational Intelligence in Healthcare and e-Health, Orlando, Florida, USA, December 9-12, 2014. (accepted)

3.     H. Chai and W. Zhao, Byzantine Fault Tolerance for Services with Commutative Operations, in Proceedings of the 11th IEEE International Conference on Services Computing, Anchorage, Alaska, USA, June 27 – July 2, 2014, pp. 219-226.

4.     H. Chai and W. Zhao, Byzantine Fault Tolerant Event Stream Processing for Autonomic Computing, in Proceedings of the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing, Dalian, China, August 24-27, 2014, pp. 109-114.

5.     W. Zhao, Application-Aware Byzantine Fault Tolerance, in Proceedings of the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing, Dalian, China, August 24-27, 2014, pp. 45-50.

6.     W. Zhao, H. Feng, R. Lun, D. Espy, and A. Reinthal, A Kinect-Based Rehabilitation Exercise Monitoring and Guidance System, in Proceedings of the 5th IEEE International Conference on Software Engineering and Service Science, Beijing, China, June 27-29, 2014, pp. 762-765.

7.     H. Chai and W. Zhao, Towards Trustworthy Complex Event Processing, in Proceedings of the 5th IEEE International Conference on Software Engineering and Service Science, Beijing, China, June 27-29, 2014, pp. 758-761.

8.     W. Zhao, On the Quorum Requirement and Value Selection Rule for Fast Paxos, in Proceedings of the 5th IEEE International Conference on Software Engineering and Service Science, Beijing, China, June 27-29, 2014, pp. 406-409.

9.     B. Krupp, N. Sridhar, and W. Zhao, An Ontology for Enforcing Security and Privacy Policies on Mobile Devices]”?, Proceedings of the 6th International Conference on Knowledge Engineering and Ontology Development, pp. 288-295, October 21-24, 2014.

10.   B. Krupp, N. Sridhar, and W. Zhao, A Proposed Framework for Enhancing Security and Privacy on Unmodified Mobile Operating Systems, Proceedings of the 1st International Workshop on Mobile Cloud and Social Computing, Philadelphia, pp.404-409, July 2013.

11.   W. Zhao and M. Babi, Byzantine Fault Tolerant Collaborative Editing, in Proceedings of the IET International Conference on Information and Communications Technologies, pp. 233-240, Beijing, China, April 27-29, 2013.

12.   W. Zhao, Towards Practical Intrusion Tolerant Systems, in Proceedings of the IET International Conference on Information and Communications Technologies, pp. 280-287, Beijing, China, April 27-29, 2013.

13.   Byzantine Fault Tolerance as a Service,
Hua Chai and Wenbing Zhao,
in Proceedings of WSE 2012, Springer  CCIS Vol. 342, Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition,  pp. 173-179.

14.   Interaction Patterns for Byzantine Fault Tolerance,
Hua Chai and Wenbing Zhao,
in Proceedings of WSE 2012, Springer  CCIS Vol. 342, Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition,  pp. 180-188.

15.   Leader-Determined Membership Protocol,
Wenbing Zhao, P. M. Melliar-Smith, and L. E. Moser,
in Proceedings of the 13th IEEE International High Assurance Systems Engineering Symposium, Boca Raton, FL, Nov. 10-12, 2011, pp. 124-129.

16.   Fault Tolerance Middleware for Cloud Computing,
Wenbing Zhao, P. M. Melliar-Smith, and L. E. Moser, in Proceedings of the IEEE International Conference on Cloud Computing, Miami, FL, July 5-10, 2010, pp. 67-74.

17.   Integrity-Preserving Replica Coordination for Byzantine Fault Tolerant Systems,
Wenbing Zhao, in Proceedings of the IEEE International Conference on  Parallel and Distributed Systems, Melbourne, Victoria, Australia, December 8-10 2008, pp. 447-454.

18.   Byzantine Fault Tolerant Coordination for Web Services Business Activities,
Wenbing Zhao and Honglei Zhang, Proceedings of the IEEE International Conference on Services Computing, Honolulu, Hawaii, July 8-11 2008, pp. 407-414.(18% acceptance rate for research track papers).

19.   Byzantine Fault Tolerance for Electric Power Grid Monitoring and Control,
Wenbing Zhao and F. Eugenio Villaseca, Proceedings of the International Conference on Embedded Software and Systems, Chengdu, Sichuan, China, July 29-31 2008, pp. 129-135.(16% acceptance rate for regular papers).

20.   Towards Practical Intrusion Tolerant Systems: A Blueprint,
Wenbing Zhao, Proceedings of the Cyber Security and Information Intelligence Research Workshop, Oak Ridge National Laboratory, May 12-14, 2008.

21.   BFT-WS: A Byzantine Fault Tolerance Framework for Web Services,
Wenbing Zhao, Proceedings of the Middleware for Web Services Workshop, Annapolis, MD, October 2007, pp. 89-96. (Won the Most Promising Research Award)

22.   A Lightweight Fault Tolerance Framework for Web Services,
Wenbing Zhao, Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, Silicon Valley, CA, November 2007, pp. 542-548.(16% acceptance rate for regular papers).

23.   Byzantine Fault Tolerant Coordination for Web Services Atomic Transactions,
Wenbing Zhao, Proceedings of the 5th International Conference on Service-Oriented Computing, LNCS, vol.4749, Vienna, Austria, September 2007, pp. 307-318. (21% acceptance rate for full papers)

24.   A Byzantine Fault Tolerant Distributed Commit Protocol,
Wenbing Zhao, Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Loyola College Graduate Center, Columbia, MD, USA, September 2007, pp. 37-44.  

25.   Byzantine Fault Tolerance for Nondeterministic Applications,
Wenbing Zhao, Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Loyola College Graduate Center, Columbia, MD, USA, September 2007, pp. 108-115.

26.   Making Web Services Dependable,
L. E. Moser, P. M. Melliar-Smith and W. Zhao,
Proceedings of the First International Conference on Availability, Reliability and Security, the International Dependability Conference Bridging Theory and Practice, Vienna University of Technology, Austria, April 2006, pp. 440-448.

27.   A Reservation-Based Coordination Protocol for Web Services,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the IEEE International Conference on Web Services, Orlando, Florida, July 2005, pp. 49-56.

28.   Deterministic Scheduling for Multithreaded Replicas,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the IEEE International Workshop on Object-oriented Real-time Dependable Systems, Sedona, Arizona, February 2005, pp. 74-81.

29.   Checkpointing and Logging for Intrusion Analysis and Recovery,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Supplement Proceedings of the IEEE International Conference on Dependable Systems and Networks, June 2004, 110-111.

30.   Design and Implementation of a Consistent Time Service for Fault-Tolerant Distributed Systems,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the IEEE International Conference on Dependable Systems and Networks, San Francisco, CA, June 2003, pp. 341-350.

31.   On Bootstrapping Replicated Applications,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the IEEE International Computer Software and Applications Conference, Oxford, UK, August 2002, pp. 239-245.

32.   End-to-end latency analysis and evaluation of a fault-tolerant CORBA infrastructure,
W. Zhao, L. E. Moser and P. M. Melliar-Smith, (Won the Best Paper Award on Computer Systems)
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication System, San Diego, CA, July 2002, pp. 821-830.

33.   Unification of Replication and Transaction Processing in Three-Tier Architectures,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the IEEE  International Conference on Distributed Computing Systems, Vienna, Austria, July 2002, pp. 290-297.

34.   End-to-End Latency of a Fault-Tolerant CORBA Infrastructure,
W. Zhao, L. E. Moser, and P. M. Melliar-Smith
Proceedings of the IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, Washington, D.C., April-May 2002, pp. 189-198.

35.   Design and Implementation of a Pluggable Fault Tolerant CORBA Infrastructure,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the International Parallel and Distributed Processing Symposium, Fort Lauderdale, FL, April 2002.

36.   Integrating Fault Tolerant CORBA and the CORBA Object Transaction Service,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the International Conference on Software and Systems Engineering and their Applications, Paris, France, December 2001.

37.   Increasing the Reliability of Three-Tier Applications,
W. Zhao, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the IEEE International Symposium on Software Reliability Engineering, Hong Kong, China, November 2001, pp. 138-147.

38.   Experimental Evaluation of a Fault Tolerant CORBA System,
W. Zhao, P. Narasimhan, L. E. Moser and P. M. Melliar-Smith,
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV, June 2001, pp. 390-396.

 

OTHER JOURNAL PUBLICATIONS

1.     Kinetics of condensation in trapped exciton gases,
W. Zhao, P. Stenius and A. Imamoglu,
Physical Review B (Condensed Matter), vol. 56, no. 9, September 1997, pp. 5306-5315.

2.     Condensation of excitons in a two-dimensional harmonic trap,
P. Stenius, W. Zhao and A. Imamoglu,
Physica Status Solidi A, vol. 164, no. 1, Akademie Verlag, December 1997, pp. 365-370.

3.     A new approach to probe the interactions between C60 and non-alkali-metals,
W. Zhao, J. Wu, J. Chen, K. Wu, J. Zhang, C. Li, D. Yin, Z. Gu, X. Zhou and Z. Jin,   
Natural Science Journal of Peking University, vol. 32, no. 1, 1996, pp. 51-56.

4.     Nonlinear resistivity and critical behavior of metal-overlayer percolation systems on epitaxial fullerene films,
J. Q. Wu, W. B. Zhao, J. Chen, K. Wu, Z. J. Wang, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, Z. X. Jin and X. H. Zhou,
Physical Review B (Condensed Matter), vol. 54, no. 4, October 1996, pp. 9840-9845.

5.     The scaling law of the pinning force and anomalous Hall effect in the high-Tc superconductors,
J. Chen, D. Yin, C. Y. Li, W. B. Zhao, K. Wu and J. L. Zhang,
Journal of Physics: Condensed Matter, vol. 7, no. 43, October 1995, pp. 8331-8335.

6.     The scaling law of the pinning force in the mixed state of HTSC,
C. Y. Li, J. Chen, J. Q. Wu, W. B. Zhao, K. Wu, J. L. Zhang and D. L. Yin,
Chinese Journal of Low Temperature Physics, vol. 17, no. 6, Science Press, November 1995, pp. 420-424.

7.     A new formulation for the flux creep rate based on the extended creep model,
J. L. Zhang, Q. Z. Yao, J. Chen, W. B. Zhao, C. Y. Li and D. L. Yin,
Chinese Journal of Low Temperature Physics, vol. 17, no. 2, March 1995, pp.124-129.

8.     Heterojunctions of solid C60 and crystalline silicon: rectifying properties and energy-band models,
K. M. Chen, Y. Q. Jia, S. X. Jin, K. Wu, W. B. Zhao, C. Y. Li, Z. N. Gu and X. H. Zhou,
Journal of Physics: Condensed Matter, vol. 7, no. 14, April 1995, pp. L201-207.

9.     The bias-temperature effect in a rectifying Nb/C60/p-Si structure: Evidence for mobile negative charges in the solid C60 film,
K. M. Chen, Y. Q. Jia, S. X. Jin, K. Wu, X. D. Zhang, W. B. Zhao, C. Y. Li and Z. N. Gu,
Journal of Physics: Condensed Matter, vol. 6, no. 27, July 1994, pp. L367-372.

10.   In situ electronic transport measurement as a tool for investigating the 2D doping in metal-C60 interfacial systems,
W. B. Zhao, J. Chen, K. Wu, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, H. Zhou and Z. X. Jin,
Journal of Physics: Condensed Matter, vol. 6, no. 41, October 1994, pp. L631-636.

11.   Surface enhanced electronic transport. A new method to probe the possible interactions between C60 and non-alkali metals,
X. D. Zhang, W. B. Zhao, K. Wu, Z. Y. Ye, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, H. Zhou and Z. X. Jin,
Chemical Physics Letters, vol. 228, no.1-3, September 1994, pp. 100-105.

12.   Study of epitaxial growth of C60,
W. B. Zhao, X. D. Zhang, Z. Y. Ye, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, X. H. Zhou and Z. X. Jin,
Chinese Journal of Low Temperature Physics, vol. 15, 1994, pp. 325.

13.   Anomalous variation of resistivity in are-earth metal Ce-C60 multilayer thin film,
W. B. Zhao, X. D. Zhang, K. Wu, C. Y. Li, D. L. Yin, Z. N. Gu, X. H. Zhou and Z. X. Jin,
Chinese Journal of Low Temperature Physics, vol. 14, 1994, pp. 401.

14.   Study of microstructure of epitaxial fullerenes films,
W. B. Zhao, X. D. Zhang, K. Wu, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, H. Zhou and Z. X. Jin,
Thin Solid Films, vol. 240, no. 1-2, March 1994, pp. 14-21.

15.   Growth and structure of C60 thin films on NaCl, glass and mica substrates,
W. B. Zhao, X. D. Zhang, K. J. Luo, J. Chen, Z. Y. Ye, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, H. Zhou and Z. X. Jin,
Thin Solid Films, vol. 232, no. 2, September 1993, pp.149-153.

16.   Rubidium-doped epitaxial C60 thin films: Synthesis and electronic transport,
W. B. Zhao, X. D. Zhang, J. Chen, J. Tan, K. Wu, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, H. Zhou and Z. X. Jin,
Journal of Physics: Condensed Matter, vol. 5, no. 33, August 1993, pp. L409-414.

17.   Synthesis of K3C60 single crystal thin films with high critical currents,
W. B. Zhao, X. D. Zhang, K. Z. Y. Ye, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, H. Zhou and Z. X. Jin,
Solid State Communications, vol. 85, no. 11, March 1993, pp. 945-947.

18.   Epitaxial thin films of C70: growth and structure characterization,
W. B. Zhao, X. D. Zhang, Z. Y. Ye, J. L. Zhang, C. Y. Li, D. L. Yin, Z. N. Gu, H. Zhou and Z. X. Jin,
Solid State Communications, vol. 85, no. 4, January 1993, pp. 311-315.

19.   A possible interaction between nonalkali metals and C60 thin films,
W. Zhao, K. Luo, J. Cheng, C. Li, D. Yin, Z. Gu, X. Zhou and Z. Jin,
Journal of Physics: Condensed Matter, vol. 4, no. 40, October 1992, pp. L513-514.

20.   Anomalous variation of resistivity in Sn-C60 multilayer thin films,
W. B. Zhao, K. J. Luo, J. Chen, Z. Y. Ye, C. Y. Li, D. L. Yin, Z. N. Gu, X. H. Zhou and Z. X. Jin,
Chinese Journal of Low Temperature Physics, vol. 14, 1994, pp. 401.

21.   Study of microstructure and anomalous variation of resistivity in metal-C60 multilayer thin films,
W. Zhao, K. Luo, J. Chen, J. Zhang, C. Li, D. Yin, Z. Gu, X. Zhou and Z. Jin,
Solid State Communications, vol. 83, no.11, September 1992, pp. 853-855.

 

BOOK CHAPTERS

1.     W. Zhao, Database Replication and Clustering for High Availability, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 1748-1755.

2.     W. Zhao, An Overview of Intrusion Tolerance Techniques, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 4231-4238.

3.     W. Zhao, Enhancing Service Integrity of Byzantine Fault Tolerant Applications, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 2827-2834.

4.     W. Zhao, Enhancing the Trustworthiness of Web Services Coordination, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 7614-7622.

5.     W. Zhao, Byzantine Fault Tolerant Monitoring and Control for Electric Power Grid, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 2677-2685.

6.     W. Zhao, Increasing the Trustworthiness of Online Gaming Applications, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 3062-3069.

7.     W. Zhao, D. Espy, A. Reinthal, and H. Feng, Feasibility Study of Using Microsoft Kinect for Physical Therapy Monitoring, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 5542-5554.

8.     M. Babi and W. Zhao, Conflicts and Resolutions in Computer Supported Collaborative Work Applications, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 567-575.

9.     M. Babi and W. Zhao, Increasing the Trustworthiness of Collaborative Applications, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 4317-4324.

10.   B. Krupp, W. Zhao, N. Sridhar, A Survey of Security and Privacy Protection in Mobile Devices, Encyclopedia of Information Science and Technology, Third Edition, 2014, pp. 4221-4230.

11.   W. Zhao, F. Kart, L. E. Moser and P. M. Melliar-Smith,  A Reservation-Based Extended Transaction Protocol for Coordination of Web Services, in Web Services Research for Emerging Applications: Discoveries and Trends, Advances in Web Services Research series, 2010, pp. 590-619, Information Science Reference.

12.   W. Zhao, Concurrency Control in Real-Time E-Collaboration Systems, as Chapter 2.6 in E-Collaboration: Concepts, Methodologies, Tools, and Applications, Ed. Ned Kock, Information Science Reference, 2009, pp. 211-218.

13.   W. Zhao, “Increasing the Performability of Wireless Web Services,” as Chapter XLVIII, in Handbook of Research in Mobile Business: Technical, Methodological, and Social Perspectives, 2nd Edition, Idea Group Publishing, 2008, pp. 518-528.

14.   B. Chen and W. Zhao, “Building Secure and Dependable Online Gaming Applications,” Encyclopedia of Information Science and Technology, 2nd Edition, Idea Group Publishing, 2008, pp. 428-432.

15.   H. Zhang and W. Zhao, “Web Services Coordination for Business Transactions,” Encyclopedia of Information Science and Technology, 2nd Edition, Idea Group Publishing, 2008, pp. 4070-4076.

16.   W. Zhao, “Intrusion Tolerance in Information Systems,” Encyclopedia of Information Science and Technology, 2nd Edition, Idea Group Publishing, 2008, pp. 2239-2243.

17.   W. Zhao, “Highly Available Database Management Systems,” Encyclopedia of Information Science and Technology, 2nd Edition, Idea Group Publishing, 2008, pp. 1733-1737.

18.   W. Zhao, “Concurrency Control in Real-Time E-Collaboration Systems,” Encyclopedia of E-Collaboration, Idea Group Publishing, 2008, pp. 95-101.

19.   W. Zhao, “Anonymous Peer-to-Peer Systems,” Encyclopedia of Information Ethics and Security, Idea Group Publishing, 2007, pp. 23-29.

20.   W. Zhao, “Building Secure and Dependable Information Systems,” Encyclopedia of Information Ethics and Security, Idea Group Publishing, 2007, pp. 62-67.

21.   W. Zhao, L. E. Moser and P. M. Melliar-Smith, “Transparent Fault Tolerance for Distributed and Networked Applications,” Encyclopedia of Information Science and Technology, Idea Group Publishing, January 2005, pp. 1190-1197.

22.   W. Zhao, L. E. Moser and P. M. Melliar-Smith, “High Availability and Data Consistency for Three-Tier Enterprise Applications,” Encyclopedia of E-Commerce, E-Government and Mobile Commerce, Idea Group Publishing, March 2006, pp. 552-558.

--------------------------------------

The most recent publications (2008 and later) listed above are based upon work supported by the National Science Foundation under Grant No. 0821319. Any opinions, findings, and conclusions or recommendations expressed in these materials are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.