Publications

Export 23 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is Protocols  [Clear All Filters]
Conference Papers
Krishnamurthy S, Sanders WH, Cukier M.  2002.  An adaptive framework for tunable consistency and timeliness using replication. :17-26.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Meyer R, Cukier M.  2006.  Assessing the Attack Threat due to IRC Channels. :467-472.
Hollingsworth J, Guven E, Akinlar C.  1998.  Benchmarking a network of PCs running parallel applications. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :1-7.
Li J, Deshpande A, Khuller S.  2010.  On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
McCune JM, Elaine Shi, Perrig A, Reiter MK.  2005.  Detection of denial-of-message attacks on sensor network broadcasts. :64-78.
Matthur A, Mundur P.  2003.  Dynamic load balancing across mirrored multimedia servers. 2003 International Conference on Multimedia and Expo, 2003. ICME '03. Proceedings. 2:II-53-6vol.2-II-53-6vol.2.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Duggal HS, Cukier M, Sanders WH.  1997.  Probabilistic verification of a synchronous round-based consensus protocol. :165-174.
Hedin B, Oard D.  2009.  Replication and automation of expert judgments: Information engineering in legal e-discovery. IEEE International Conference on Systems, Man and Cybernetics, 2009. SMC 2009. :102-107.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Zotkin DN, Duraiswami R, Philomin V, Davis LS.  2000.  Smart videoconferencing. 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. 3:1597-1600vol.3-1597-1600vol.3.
Naor M, Schulman LJ, Srinivasan A.  1995.  Splitters and near-optimal derandomization. , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings. :182-191.
Cleaveland R, Zwarico AE.  1991.  A theory of testing for real-time. , Proceedings of Sixth Annual IEEE Symposium on Logic in Computer Science, 1991. LICS '91. :110-119.
Journal Articles
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Morselli R, Bhattacharjee B, Marsh MA, Srinivasan A.  2007.  Efficient lookup on unstructured topologies. IEEE Journal on Selected Areas in Communications. 25(1):62-72.
Mundur P, Simon R, Sood AK.  2004.  End-to-end analysis of distributed video-on-demand systems. IEEE Transactions on Multimedia. 6(1):129-141.
Shneiderman B.  1982.  Multiparty Grammars and Related Features for Defining Interactive Systems. IEEE Transactions on Systems, Man and Cybernetics. 12(2):148-154.
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
Litwin WA, Roussopoulos N, Levy G, Hong W.  1991.  Trie hashing with controlled load. IEEE Transactions on Software Engineering. 17(7):678-691.