Publications

Export 23 results:
[ Author(Asc)] Title Type Year
Filters: Keyword is Protocols  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Z
Zotkin DN, Duraiswami R, Philomin V, Davis LS.  2000.  Smart videoconferencing. 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. 3:1597-1600vol.3-1597-1600vol.3.
Y
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
S
Shneiderman B.  1982.  Multiparty Grammars and Related Features for Defining Interactive Systems. IEEE Transactions on Systems, Man and Cybernetics. 12(2):148-154.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
P
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
N
Naor M, Schulman LJ, Srinivasan A.  1995.  Splitters and near-optimal derandomization. , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings. :182-191.
M
Mundur P, Simon R, Sood AK.  2004.  End-to-end analysis of distributed video-on-demand systems. IEEE Transactions on Multimedia. 6(1):129-141.
Morselli R, Bhattacharjee B, Marsh MA, Srinivasan A.  2007.  Efficient lookup on unstructured topologies. IEEE Journal on Selected Areas in Communications. 25(1):62-72.
Meyer R, Cukier M.  2006.  Assessing the Attack Threat due to IRC Channels. :467-472.
McCune JM, Elaine Shi, Perrig A, Reiter MK.  2005.  Detection of denial-of-message attacks on sensor network broadcasts. :64-78.
Matthur A, Mundur P.  2003.  Dynamic load balancing across mirrored multimedia servers. 2003 International Conference on Multimedia and Expo, 2003. ICME '03. Proceedings. 2:II-53-6vol.2-II-53-6vol.2.
L
Litwin WA, Roussopoulos N, Levy G, Hong W.  1991.  Trie hashing with controlled load. IEEE Transactions on Software Engineering. 17(7):678-691.
Li J, Deshpande A, Khuller S.  2010.  On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
H
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
Hedin B, Oard D.  2009.  Replication and automation of expert judgments: Information engineering in legal e-discovery. IEEE International Conference on Systems, Man and Cybernetics, 2009. SMC 2009. :102-107.
C
Cleaveland R, Zwarico AE.  1991.  A theory of testing for real-time. , Proceedings of Sixth Annual IEEE Symposium on Logic in Computer Science, 1991. LICS '91. :110-119.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
B
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
A
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.