Publications

Export 23 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is Protocols  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
B
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
C
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Cleaveland R, Zwarico AE.  1991.  A theory of testing for real-time. , Proceedings of Sixth Annual IEEE Symposium on Logic in Computer Science, 1991. LICS '91. :110-119.
H
Hedin B, Oard D.  2009.  Replication and automation of expert judgments: Information engineering in legal e-discovery. IEEE International Conference on Systems, Man and Cybernetics, 2009. SMC 2009. :102-107.
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
L
Li J, Deshpande A, Khuller S.  2010.  On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
Litwin WA, Roussopoulos N, Levy G, Hong W.  1991.  Trie hashing with controlled load. IEEE Transactions on Software Engineering. 17(7):678-691.
M
Matthur A, Mundur P.  2003.  Dynamic load balancing across mirrored multimedia servers. 2003 International Conference on Multimedia and Expo, 2003. ICME '03. Proceedings. 2:II-53-6vol.2-II-53-6vol.2.
McCune JM, Elaine Shi, Perrig A, Reiter MK.  2005.  Detection of denial-of-message attacks on sensor network broadcasts. :64-78.
Meyer R, Cukier M.  2006.  Assessing the Attack Threat due to IRC Channels. :467-472.
Morselli R, Bhattacharjee B, Marsh MA, Srinivasan A.  2007.  Efficient lookup on unstructured topologies. IEEE Journal on Selected Areas in Communications. 25(1):62-72.
Mundur P, Simon R, Sood AK.  2004.  End-to-end analysis of distributed video-on-demand systems. IEEE Transactions on Multimedia. 6(1):129-141.
N
Naor M, Schulman LJ, Srinivasan A.  1995.  Splitters and near-optimal derandomization. , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings. :182-191.
P
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
S
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Shneiderman B.  1982.  Multiparty Grammars and Related Features for Defining Interactive Systems. IEEE Transactions on Systems, Man and Cybernetics. 12(2):148-154.
Y
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Z
Zotkin DN, Duraiswami R, Philomin V, Davis LS.  2000.  Smart videoconferencing. 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. 3:1597-1600vol.3-1597-1600vol.3.