Publications

Export 23 results:
Author Title [ Type(Asc)] Year
Filters: Keyword is Protocols  [Clear All Filters]
Journal Articles
Litwin WA, Roussopoulos N, Levy G, Hong W.  1991.  Trie hashing with controlled load. IEEE Transactions on Software Engineering. 17(7):678-691.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
Shneiderman B.  1982.  Multiparty Grammars and Related Features for Defining Interactive Systems. IEEE Transactions on Systems, Man and Cybernetics. 12(2):148-154.
Mundur P, Simon R, Sood AK.  2004.  End-to-end analysis of distributed video-on-demand systems. IEEE Transactions on Multimedia. 6(1):129-141.
Morselli R, Bhattacharjee B, Marsh MA, Srinivasan A.  2007.  Efficient lookup on unstructured topologies. IEEE Journal on Selected Areas in Communications. 25(1):62-72.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Conference Papers
Cleaveland R, Zwarico AE.  1991.  A theory of testing for real-time. , Proceedings of Sixth Annual IEEE Symposium on Logic in Computer Science, 1991. LICS '91. :110-119.
Naor M, Schulman LJ, Srinivasan A.  1995.  Splitters and near-optimal derandomization. , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings. :182-191.
Zotkin DN, Duraiswami R, Philomin V, Davis LS.  2000.  Smart videoconferencing. 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. 3:1597-1600vol.3-1597-1600vol.3.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Hedin B, Oard D.  2009.  Replication and automation of expert judgments: Information engineering in legal e-discovery. IEEE International Conference on Systems, Man and Cybernetics, 2009. SMC 2009. :102-107.
Duggal HS, Cukier M, Sanders WH.  1997.  Probabilistic verification of a synchronous round-based consensus protocol. :165-174.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Matthur A, Mundur P.  2003.  Dynamic load balancing across mirrored multimedia servers. 2003 International Conference on Multimedia and Expo, 2003. ICME '03. Proceedings. 2:II-53-6vol.2-II-53-6vol.2.
McCune JM, Elaine Shi, Perrig A, Reiter MK.  2005.  Detection of denial-of-message attacks on sensor network broadcasts. :64-78.
Li J, Deshpande A, Khuller S.  2010.  On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
Meyer R, Cukier M.  2006.  Assessing the Attack Threat due to IRC Channels. :467-472.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Krishnamurthy S, Sanders WH, Cukier M.  2002.  An adaptive framework for tunable consistency and timeliness using replication. :17-26.