Displaying works 161 - 180 of 202 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2012 conference paper
Enhanced wireless channel authentication using time-synched link signature
2012 Proceedings IEEE infocom, 2636–2640.
2012 conference paper
Efficient Intranode communication in GPU-accelerated systems
Ieee international symposium on parallel and distributed processing, 1838–1847.
2012 article
Dissecting Android Malware: Characterization and Evolution
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109.
2012 article
Combining Partial Redundancy and Checkpointing for HPC
2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 615–626.
2012 journal article
Choice as a Principle in Network Architecture
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 42(4), 105–106.
Contributors: I. Baldine*, K. Calvert *, R. Dutta n , J. Griffioen *, A. Nagurney *, G. Rouskas n , T. Wolf *
2012 conference paper
BitTrickle: Defending against broadband and high-power reactive jamming attacks
2012 Proceedings IEEE infocom, 909–917.
2012 conference paper
A Byzantine attack defender: The Conditional Frequency Check
2012 ieee international symposium on information theory proceedings (isit).
2012 journal article
Who's Watching Your Food? A Flexible Framework for Public Health Monitoring
TRANSACTIONS IN GIS, 16(2), 89–104.
2012 journal article
Semantically rich application-centric security in Android
SECURITY AND COMMUNICATION NETWORKS, 5(6), 658–673.
2012 journal article
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks
AD HOC NETWORKS, 10(7), 1204–1220.
2012 journal article
Platys Social: Relating Shared Places and Private Social Circles
IEEE INTERNET COMPUTING, 16(3), 53–59.
Contributors: P. Murukannaiah n & M. Singh n
2012 journal article
Local construction of spanners in the 3D space
IEEE Transactions on Mobile Computing, 11(7), 1140–1150.
2012 journal article
Functional Annotation of Hierarchical Modularity
PLOS ONE, 7(4).
2012 journal article
Tractable XML data exchange via relations
FRONTIERS OF COMPUTER SCIENCE, 6(3), 243–263.
2012 journal article
Reports on the 2011 AAAI Fourth Artificial Intelligence for Interactive Digital Entertainment Conference Workshops
AI MAGAZINE, 33(1), 55–56.
2012 journal article
Interval-based flow watermarking for tracing interactive traffic
COMPUTER NETWORKS, 56(5), 1646–1665.
2012 journal article
SLAW: Self-Similar Least-Action Human Walk
IEEE-ACM TRANSACTIONS ON NETWORKING, 20(2), 515–529.
2012 journal article
Intrusion Detection Models Based on Data Mining
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 5(1), 30–38.
2012 journal article
IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals
IEEE-ACM TRANSACTIONS ON NETWORKING, 20(2), 557–570.
2012 article
Special Issue: Selected Papers from the Fourth International IEEE Symposium on Advanced Networks and Telecommunication Systems (IEEE ANTS 2010)
Mukherjee, B., Dutta, R., Sivalingam, K., Vokkarane, V., & Jukan, A. (2012, April). OPTICAL SWITCHING AND NETWORKING, Vol. 9, pp. 145–146.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.